- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
CSPST: Guidance for buyers
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
This Framework sets out Scotland’s vision for a cyber resilient Scotland and includes refreshed action plans.
Read more The Strategic Framework for a Cyber Resilient Scotland in modal dialogThis guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialogPolice Scotland’s advice on protecting against romance fraud.
Read more Romance Fraud in modal dialogThis guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialogThis guide highlights how fraudsters exploit social media marketplaces to trick users into buying or selling items that either don’t exist or aren’t as advertised – whether that’s goods, tickets or other services. It outlines what to watch out for, […]
Read more Social Media Marketplace Fraud Guide in modal dialogCyber security advice for businesses, charities and critical national infrastructure with more than 250 employees. You are likely to have a dedicated team managing your cyber security.
Read more Large Organisations in modal dialog