- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Data protection
Information on how to legally protect personal information.
Information on how to legally protect personal information.
This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]
Read more Cryptocurrency Scam Guidance in modal dialogThis report entitled ‘Firm foundations’ highlights the progress of ‘Safe, Secure and Prosperous: A Cyber Resilience Strategy for Scotland’ (2015-2020).
Read more Cyber Resilience Strategy 2015-2020: Progress Report in modal dialogThis guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication (MFA). It describes the various types of MFA that are commonly available, explains some pitfalls to […]
Read more Multi-factor authentication for your corporate online services in modal dialogResources to help public sector bodies embed cyber resilience into the supply chain process.
Read more Supporting guidance for public bodies in modal dialogThis guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialogGuidance for individuals, charities and small businesses to improve their cyber resilience and report cyber crime.
Read more Cyber Advice and Support in modal dialog