This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Read more CSPST: Guidance for buyers in modal dialog
Find the company that can help manage all of your IT Services. Search the directory of over 170 Scottish companies who provide IT Managed Services. It will easily identify those that are both cyber resilient themselves through the Cyber Essentials […]
Read more IT Managed Services Directory in modal dialog
Outlines the procedures for notifying and coordinating responses to notifiable cyber incidents affecting Scotland’s public services. It defines the agreed-upon cyber incident notification process adopted by the Scottish public sector since 2018.
Read more Public Sector Cyber Incident Co-ordination Procedure in modal dialog
We live in a digital world, but some people remain excluded. Digital inclusion is the process of providing the tools and access for those that are excluded.
Read more Digital inclusion in modal dialog
The NCSC scheme to help organisations of all sizes access consistent, high quality cyber security advice. Resource to support with Cyber Essentials readiness and certification
Read more Cyber Advisor Scheme in modal dialog