Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Small Charity Guide

Small Charity Guide

The advice in the Cyber Security: Small Charity Guide will significantly increase your protection from the most common types of cyber crime. The five topics covered in the guidance are easy to understand, and are free or cost little to implement. 

Related resources

Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure

Outlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.

Read more Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure in modal dialog

Scottish Information Sharing Network (SciNET Group)

SciNet is a community for Scottish Buisnesses to engage on CiSP. The Cyber Security Information Sharing Partnership (CiSP) is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and […]

Read more Scottish Information Sharing Network (SciNET Group) in modal dialog

NCSC Cyber Toolkit

This pack has been created to help you amplify and promote NCSC’s newonline service – the Cyber Action Toolkit, which is designed to help soletraders and small businesses take their first steps in cyber security. Small businesses are often at […]

Read more NCSC Cyber Toolkit in modal dialog

Cyber Training for Staff

Free e-learning training introduces why cyber security is important and how attacks happen. It will give you actionable advice about how to defend yourself.  The NCSC’s e-learning package ‘Top Tips For Staff’ can be completed online, or built into your […]

Read more Cyber Training for Staff in modal dialog

SIM Swap Guidance

This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]

Read more SIM Swap Guidance in modal dialog
Back to top of the page