This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialog
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog
This guide highlights how fraudsters exploit social media marketplaces to trick users into buying or selling items that either don’t exist or aren’t as advertised – whether that’s goods, tickets or other services. It outlines what to watch out for, […]
Read more Social Media Marketplace Fraud Guide in modal dialog
This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as digital pickpocketing. As our lives become ever more connected, the convenience of storing payment cards, tickets and identification […]
Read more CyberByte – November 2025 in modal dialog
Resources to help public sector bodies embed cyber resilience into the supply chain process.
Read more Supporting guidance for public bodies in modal dialog
Child protection means protecting a child from abuse or neglect, which may cause significant harm. Police Scotland has some advice and information on how to report child abuse or neglect.
Read more Child Protection in modal dialog