This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog
This Framework sets out Scotland’s vision for a cyber resilient Scotland and includes refreshed action plans.
Read more The Strategic Framework for a Cyber Resilient Scotland in modal dialog
Proposing a series of 12 principles, designed to help you establish effective control and oversight of your supply chain.
Read more Supply Chain Security Guidance in modal dialog
Free cyber security training to raise awareness and help school staff manage some of the key cyber threats facing schools. The training is available in two formats: a scripted presentation pack or group delivery can be found below in the […]
Read more Training for School Staff in modal dialog
NCSC Cyber Essentials Partner the IASME consortium can help your organisation undertake Cyber Essentials certification or if you want to know how you can become a Certification Body.
Read more How to get cyber essentials certified IASME in modal dialog
Sextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]
Read more Sextortion Guidance in modal dialog