Cyber incident response toolkit to help organisations develop plans for responding to the threat of cyber attacks.
Read more Cyber Incident Response Toolkit in modal dialog
This guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication (MFA). It describes the various types of MFA that are commonly available, explains some pitfalls to […]
Read more Multi-factor authentication for your corporate online services in modal dialog
This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as digital pickpocketing. As our lives become ever more connected, the convenience of storing payment cards, tickets and identification […]
Read more CyberByte – November 2025 in modal dialog
This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]
Read more SIM Swap Guidance in modal dialog
The security of supply chains is increasingly important as we often see cyber incidents affect public sector bodies indirectly through their suppliers. This guidance note promotes the adoption of a consistent approach to supplier cyber security across the Scottish public […]
Read more Scottish Public Sector Supplier Cyber Security Guidance Note in modal dialog
The NCSC’s cyber security advice to protect you and your family, and the technology you rely on.
Read more Individuals & Families in modal dialog