- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Holiday Fraud
Top tips to follow to avoid falling victim to holiday fraud.
Top tips to follow to avoid falling victim to holiday fraud.
The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialogSextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]
Read more Sextortion Guidance in modal dialogWe are trying to make it easy for people to learn how to stay safe and secure online. We are doing this by providing accessible guidance and a range of ways to learn.
Read more Linking Cyber and Accessibility Project in modal dialogThis month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]
Read more CyberByte – September 2025 in modal dialogThe NCSC defines a cyber security incident as: A breach of a system’s security policy in order to affect its integrity or availability The unauthorised access or attempted access to a system Cyber incidents can take many forms, such as […]
Read more Incident Management in modal dialogGuidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Read more CSPST: Guidance for buyers in modal dialog