Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Little Book of Big Scams

Little Book of Big Scams

This booklet outlines a number of the most common online frauds and scams. It includes information on how to identify the various types of fraud and provides advice to prevent the loss of your data.

Related resources

Cyber Resilience Basics

Want to update your knowledge and skills on how to stay safe and secure in an online environment?  This quick fire series of e-learning modules is for you.  Created with youth workers in mind, each short section introduces a key […]

Read more Cyber Resilience Basics in modal dialog

Executive Education Training: Cyber Security

This programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]

Read more Executive Education Training: Cyber Security in modal dialog

Data Breach Guidance

The guide explains what a data breach is – when personal or sensitive information is accessed, lost or disclosed without authorisation – and how it might affect you. It then outlines clear steps you can take if your details have […]

Read more Data Breach Guidance in modal dialog

Cyber Strategy for Small Organisations

CyberScotland partner Cyber and Fraud Centre – Scotland has released a new cyber strategy guide for small organisations. A comprehensive cyber security strategy is crucial to protect organisations, individuals, and governments from devastating cyber attacks. This guide is designed to aid small […]

Read more Cyber Strategy for Small Organisations in modal dialog

SIM Swap Guidance

This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]

Read more SIM Swap Guidance in modal dialog
Back to top of the page