- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
CSPST: Guidance for buyers
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Sextortion is a type of cyber-enabled extortion which involves the threat of sharing sexual information, images or clips to extort money from you, whether images actually exist or not. Police Scotland have advice on what you can do to reduce […]
Read more Sextortion in modal dialogThis guide explains how scammers use email, texts, and phone calls to steal personal or financial information. It highlights common tactics, warning signs and practical steps to protect yourself, helping readers recognise and respond to these everyday cyber threats.
Read more Guide to Phishing, Smishing and Vishing Scams in modal dialogGuidance for suppliers on how to embed use of the Cyber Security Procurement Support Tool into the procurement process.
Read more CSPST: Guidance for suppliers in modal dialogA list of all the Scottish Cyber Cluster events.
Read more Cyber Cluster Events in modal dialogThis guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialogThe guide explains what a data breach is – when personal or sensitive information is accessed, lost or disclosed without authorisation – and how it might affect you. It then outlines clear steps you can take if your details have […]
Read more Data Breach Guidance in modal dialog