Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Remote Access Fraud

Remote Access Fraud

The use of remote access software in committing crime online is not very well
known, let alone how easily criminals use this method to attack unassuming
victims.

Remote access scams occur where online business and individual accounts are
compromised by cyber criminals and Police Scotland wish to raise awareness of this.

Related resources

Business email compromise: defending your organisation

This guidance helps small to medium sized organisations deal with businessemail compromise (BEC). It provides actions to help businesses reduce thelikelihood of being affected by BEC, and includes steps to take if you think yourorganisation has already been compromised.

Read more Business email compromise: defending your organisation in modal dialog

CyberByte – November 2025

This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as digital pickpocketing. As our lives become ever more connected, the convenience of storing payment cards, tickets and identification […]

Read more CyberByte – November 2025 in modal dialog

TTX Gym

Running a cyber security exercise is an immersive, effective way to evaluate and practise response skills. Yet, designing and facilitating exercises is complex. TTX Gym provides a custom-designed tool to deliver consistent, effective, and insightful exercising experiences.

Read more TTX Gym in modal dialog
Back to top of the page