Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Cyber Incident Response Toolkit

Cyber Incident Response Toolkit

Cyber incident response toolkit to help organisations develop plans for responding to the threat of cyber attacks.

Related resources

Cyber Resilience Framework

Provide a common, effective way for Scottish public sector organisations to assess their cyber resilience arrangements, identify areas of strength and weakness, gain reasonable confidence that they are adhering to minimum cyber resilience requirements, and take decisions on how/whether to […]

Read more Cyber Resilience Framework in modal dialog

TTX Gym

Running a cyber security exercise is an immersive, effective way to evaluate and practise response skills. Yet, designing and facilitating exercises is complex. TTX Gym provides a custom-designed tool to deliver consistent, effective, and insightful exercising experiences.

Read more TTX Gym in modal dialog

Business email compromise: defending your organisation

This guidance helps small to medium sized organisations deal with businessemail compromise (BEC). It provides actions to help businesses reduce thelikelihood of being affected by BEC, and includes steps to take if you think yourorganisation has already been compromised.

Read more Business email compromise: defending your organisation in modal dialog

Cyber Security Learning Opportunities

Thinking about starting a career in cyber security but not sure where to begin? There are many free challenges and competitions you can take part in which will give you an idea of the kind of skills required

Read more Cyber Security Learning Opportunities in modal dialog

CyberByte – September 2025

This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]

Read more CyberByte – September 2025 in modal dialog
Back to top of the page