Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type Web page Go to resource Scottish Public Sector Supplier Cyber Security Guidance Note

Scottish Public Sector Supplier Cyber Security Guidance Note

The security of supply chains is increasingly important as we often see cyber incidents affect public sector bodies indirectly through their suppliers. This guidance note promotes the adoption of a consistent approach to supplier cyber security across the Scottish public sector.

Related resources

Multi-factor authentication for your corporate online services

This guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication (MFA). It describes the various types of MFA that are commonly available, explains some pitfalls to […]

Read more Multi-factor authentication for your corporate online services in modal dialog

CyberByte – October 2025

This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs […]

Read more CyberByte – October 2025 in modal dialog

How to get cyber essentials certified IASME

NCSC Cyber Essentials Partner the IASME consortium can help your organisation undertake Cyber Essentials certification or if you want to know how you can become a Certification Body. 

Read more How to get cyber essentials certified IASME in modal dialog

Cyber Security Learning Opportunities

Thinking about starting a career in cyber security but not sure where to begin? There are many free challenges and competitions you can take part in which will give you an idea of the kind of skills required

Read more Cyber Security Learning Opportunities in modal dialog

Remote Access Fraud

The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]

Read more Remote Access Fraud in modal dialog
Back to top of the page