Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure

Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure

Outlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.

Related resources

Sextortion Guidance

Sextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]

Read more Sextortion Guidance in modal dialog

Multi-factor authentication for your corporate online services

This guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication (MFA). It describes the various types of MFA that are commonly available, explains some pitfalls to […]

Read more Multi-factor authentication for your corporate online services in modal dialog

IT Managed Services Directory

Find the company that can help manage all of your IT Services. Search the directory of over 170 Scottish companies who provide IT Managed Services. It will easily identify those that are both cyber resilient themselves through the Cyber Essentials […]

Read more IT Managed Services Directory in modal dialog

Training for School Staff

Free cyber security training to raise awareness and help school staff manage some of the key cyber threats facing schools. The training is available in two formats: a scripted presentation pack or group delivery can be found below in the […]

Read more Training for School Staff in modal dialog

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog
Back to top of the page