Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Passwords & Two-Step Verification

Passwords & Two-Step Verification

This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital extra layer of security to protect your accounts even if your password is compromised.

In essence: choose strong and separate passwords for each account, use a password manager if needed, and enable 2SV wherever possible to significantly boost your online safety.

Related resources

Romance Fraud 2024

Romance Fraud is a crime which is a financially driven fraud designed to exploit victims for money. It is carried out by criminals exploiting victims by convincing them they are in a genuine romantic relationship. This guidance explains what romance […]

Read more Romance Fraud 2024 in modal dialog

Scottish Public Sector Supplier Cyber Security Guidance Note

The security of supply chains is increasingly important as we often see cyber incidents affect public sector bodies indirectly through their suppliers. This guidance note promotes the adoption of a consistent approach to supplier cyber security across the Scottish public […]

Read more Scottish Public Sector Supplier Cyber Security Guidance Note in modal dialog

Multi-factor authentication for your corporate online services

This guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication (MFA). It describes the various types of MFA that are commonly available, explains some pitfalls to […]

Read more Multi-factor authentication for your corporate online services in modal dialog

Guide to Phishing, Smishing and Vishing Scams

This guide explains how scammers use email, texts, and phone calls to steal personal or financial information. It highlights common tactics, warning signs and practical steps to protect yourself, helping readers recognise and respond to these everyday cyber threats.

Read more Guide to Phishing, Smishing and Vishing Scams in modal dialog

Public Sector Cyber Incident Co-ordination Procedure

Outlines the procedures for notifying and coordinating responses to notifiable cyber incidents affecting Scotland’s public services. It defines the agreed-upon cyber incident notification process adopted by the Scottish public sector since 2018.

Read more Public Sector Cyber Incident Co-ordination Procedure in modal dialog
Back to top of the page