Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Passwords & Two-Step Verification

Passwords & Two-Step Verification

This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital extra layer of security to protect your accounts even if your password is compromised.

In essence: choose strong and separate passwords for each account, use a password manager if needed, and enable 2SV wherever possible to significantly boost your online safety.

Related resources

Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure

Outlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.

Read more Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure in modal dialog

How to get cyber essentials certified IASME

NCSC Cyber Essentials Partner the IASME consortium can help your organisation undertake Cyber Essentials certification or if you want to know how you can become a Certification Body. 

Read more How to get cyber essentials certified IASME in modal dialog
Back to top of the page