- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Social Media
Police Scotland’s advice on what precautions you should take when sharing information on social networking websites.
Police Scotland’s advice on what precautions you should take when sharing information on social networking websites.
This guide explains how scammers use email, texts, and phone calls to steal personal or financial information. It highlights common tactics, warning signs and practical steps to protect yourself, helping readers recognise and respond to these everyday cyber threats.
Read more Guide to Phishing, Smishing and Vishing Scams in modal dialogFind the company that can help manage all of your IT Services. Search the directory of over 170 Scottish companies who provide IT Managed Services. It will easily identify those that are both cyber resilient themselves through the Cyber Essentials […]
Read more IT Managed Services Directory in modal dialogThis strategy sets out how Police Scotland will take a proactive approach to respond to cyber demand, ensuring that we are future focused and able to adapt our policing model to suit the needs of the communities they serve.
Read more Police Scotland’s Cyber Security Strategy 2020 in modal dialogThe Cyber First Aid Box is an online resource that contains information about cyber security. It will help you support your child’s recovery after a negative online experience. You will find: Practical information about online safety & security. Links to […]
Read more Cyber First Aid Box in modal dialogThe NCSC provides a free service to organisations to inform them of threats against their network. This service will notify you on all cyber attacks detected by the feed suppliers against your organisation and is designed to compliment your existing […]
Read more Early Warning Service in modal dialogThis programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]
Read more Executive Education Training: Cyber Security in modal dialog