Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Cyber Strategy for Small Organisations

Cyber Strategy for Small Organisations

CyberScotland partner Cyber and Fraud Centre – Scotland has released a new cyber strategy guide for small organisations.

A comprehensive cyber security strategy is crucial to protect organisations, individuals, and governments from devastating cyber attacks. This guide is designed to aid small organisations in developing their cyber strategy, regardless of their current posture, by providing concise guidance and additional information through links. The guide can be used as a checklist tool for prioritisation, with short-term actions providing immediate protection against opportunistic attacks, medium-term actions protecting against more targeted attacks, and long-term actions involving outside audits and certifications.

To download the free guide, visit: https://www.cyberscotland.com/cyber-strategy-for-small-organisations/

Related resources

How to get cyber essentials certified IASME

NCSC Cyber Essentials Partner the IASME consortium can help your organisation undertake Cyber Essentials certification or if you want to know how you can become a Certification Body. 

Read more How to get cyber essentials certified IASME in modal dialog

Public Sector Cyber Incident Co-ordination Procedure

Outlines the procedures for notifying and coordinating responses to notifiable cyber incidents affecting Scotland’s public services. It defines the agreed-upon cyber incident notification process adopted by the Scottish public sector since 2018.

Read more Public Sector Cyber Incident Co-ordination Procedure in modal dialog

Multi-factor authentication for your corporate online services

This guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication (MFA). It describes the various types of MFA that are commonly available, explains some pitfalls to […]

Read more Multi-factor authentication for your corporate online services in modal dialog
Back to top of the page