Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Digital inclusion

Digital inclusion

We live in a digital world, but some people remain excluded. Digital inclusion is the process of providing the tools and access for those that are excluded. This can include motivation, devices, connectivity or building skills and confidence. It also requires our services to be designed in a way that make digital access possible for everyone.

We can all play a role in supporting digital inclusion. In this section you’ll find a range of support and resources to support your organisation.

Related resources

The Cyber Assessment Framework (CAF) / NCSC CAF Guidance

The Cyber Assessment Framework (CAF) provides guidance for organisations responsible for vitally important services and activities.

Read more The Cyber Assessment Framework (CAF) / NCSC CAF Guidance in modal dialog

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog

Multi-factor authentication for your corporate online services

This guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication (MFA). It describes the various types of MFA that are commonly available, explains some pitfalls to […]

Read more Multi-factor authentication for your corporate online services in modal dialog

Data Breach Guidance

The guide explains what a data breach is – when personal or sensitive information is accessed, lost or disclosed without authorisation – and how it might affect you. It then outlines clear steps you can take if your details have […]

Read more Data Breach Guidance in modal dialog

Cryptocurrency Scam Guidance

This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]

Read more Cryptocurrency Scam Guidance in modal dialog
Back to top of the page