Cyber Crime

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Cryptocurrency Scam Guidance

Cryptocurrency Scam Guidance

This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical advice on both spotting warning signs and protecting yourself.

The guide is designed to help you stay safe in the fast‑moving world of crypto and recognise when things may be too good to be true.

Related resources

Romance Fraud 2024

Romance Fraud is a crime which is a financially driven fraud designed to exploit victims for money. It is carried out by criminals exploiting victims by convincing them they are in a genuine romantic relationship. This guidance explains what romance […]

Read more Romance Fraud 2024 in modal dialog

Police Scotland’s Cyber Security Strategy 2020

This strategy sets out how Police Scotland will take a proactive approach to respond to cyber demand, ensuring that we are future focused and able to adapt our policing model to suit the needs of the communities they serve.

Read more Police Scotland’s Cyber Security Strategy 2020 in modal dialog

Cyber Resilience Framework

Provide a common, effective way for Scottish public sector organisations to assess their cyber resilience arrangements, identify areas of strength and weakness, gain reasonable confidence that they are adhering to minimum cyber resilience requirements, and take decisions on how/whether to […]

Read more Cyber Resilience Framework in modal dialog

IT Managed Services Directory

Find the company that can help manage all of your IT Services. Search the directory of over 170 Scottish companies who provide IT Managed Services. It will easily identify those that are both cyber resilient themselves through the Cyber Essentials […]

Read more IT Managed Services Directory in modal dialog
Back to top of the page