- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Safe Internet Browsing
Police Scotland’s tips and advice on how to browse the internet safely.
Police Scotland’s tips and advice on how to browse the internet safely.
This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialogFind the company that can help manage all of your IT Services. Search the directory of over 170 Scottish companies who provide IT Managed Services. It will easily identify those that are both cyber resilient themselves through the Cyber Essentials […]
Read more IT Managed Services Directory in modal dialogThe use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialogThrough our Learning Zone, we provide staff, whatever their role and level of experience, with apps and resources to help them develop their knowledge and skills. These are completely free, and staff can work through them at their own pace. […]
Read more Learning Zone in modal dialogOutlines the procedures for notifying and coordinating responses to notifiable cyber incidents affecting Scotland’s public services. It defines the agreed-upon cyber incident notification process adopted by the Scottish public sector since 2018.
Read more Public Sector Cyber Incident Co-ordination Procedure in modal dialogProvide a common, effective way for Scottish public sector organisations to assess their cyber resilience arrangements, identify areas of strength and weakness, gain reasonable confidence that they are adhering to minimum cyber resilience requirements, and take decisions on how/whether to […]
Read more Cyber Resilience Framework in modal dialog