- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
CSPST: Guidance for buyers
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialogCase studies from Scottish companies highlighting the work they are involved in.
Read more ScotlandIS Case Studies in modal dialogFree cyber security training to raise awareness and help school staff manage some of the key cyber threats facing schools. The training is available in two formats: a scripted presentation pack or group delivery can be found below in the […]
Read more Training for School Staff in modal dialogCyber security advice for businesses, charities and critical national infrastructure with more than 250 employees. You are likely to have a dedicated team managing your cyber security.
Read more Large Organisations in modal dialog5Rights are the rights that young people have already been promised in the offline world. The 5Rights campaign is about making sure we can also be supported by them in the digital world. These 5Rights are for those under 18 […]
Read more Digital Rights in modal dialogThis Framework sets out Scotland’s vision for a cyber resilient Scotland and includes refreshed action plans.
Read more The Strategic Framework for a Cyber Resilient Scotland in modal dialog