- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Data protection
Information on how to legally protect personal information.
Information on how to legally protect personal information.
Supporting organisations of all sizes to manage their communications strategy before, during and after a cyber security incident.
Read more Guidance on effective communications in a cyber incident in modal dialogThe use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialogThis guidance aims to help organisations manage their cyber security risks by breaking down the task of protecting the organisation into 10 components. It is aimed at medium to large organisations that have someone dedicated to managing the organisation’s cyber security.
Read more 10 Steps to Cyber Security in modal dialogSextortion is a type of cyber-enabled extortion which involves the threat of sharing sexual information, images or clips to extort money from you, whether images actually exist or not. Police Scotland have advice on what you can do to reduce […]
Read more Sextortion in modal dialogThis report entitled ‘Firm foundations’ highlights the progress of ‘Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland’ (2015-2020).
Read more Cyber Resilience Strategy 2015-2020: Progress Report in modal dialog