This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]
Read more CyberByte – September 2025 in modal dialog
This site is the home of security strategies, standards, policies, and guidance for UK government departments and their arm’s length bodies.
Read more Government Security in modal dialog
Clusters promote economic growth through leveraging the innovation and business potential of a region; generating new employment opportunities, new products and services, new companies, new R&D activities and new patents. Find out more information about the clusters in Scotland.
Read more ScotlandIS Clusters in modal dialog
The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialog
The IASME Cyber Essentials Certificate Search is to verify the Cyber Essentials and Cyber Essentials Plus certification of an organisation. Use this to check whether an organisation holds Cyber Essentials certification to support supplier assurance.
Read more Cyber Essentials Certificate Search in modal dialog
The guide explains what a data breach is – when personal or sensitive information is accessed, lost or disclosed without authorisation – and how it might affect you. It then outlines clear steps you can take if your details have […]
Read more Data Breach Guidance in modal dialog