This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialog
Clusters promote economic growth through leveraging the innovation and business potential of a region; generating new employment opportunities, new products and services, new companies, new R&D activities and new patents. Find out more information about the clusters in Scotland.
Read more ScotlandIS Clusters in modal dialog
5Rights are the rights that young people have already been promised in the offline world. The 5Rights campaign is about making sure we can also be supported by them in the digital world. These 5Rights are for those under 18 […]
Read more Digital Rights in modal dialog
Guidance that helps small to medium sized organisations prepare their response to and plan their recovery from a cyber incident.
Read more Small Business Guide: Response and Recovery in modal dialog
This pack has been created to help you amplify and promote NCSC’s newonline service – the Cyber Action Toolkit, which is designed to help soletraders and small businesses take their first steps in cyber security. Small businesses are often at […]
Read more NCSC Cyber Toolkit in modal dialog
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog