- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Scottish Cyber Cluster
The latest blogs, articles and reports from the Scottish Cyber Cluster.
The latest blogs, articles and reports from the Scottish Cyber Cluster.
This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the […]
Read more SIM Swap Guidance in modal dialogThis month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as digital pickpocketing. As our lives become ever more connected, the convenience of storing payment cards, tickets and identification […]
Read more CyberByte – November 2025 in modal dialogThis guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialogNCSC’s Board Toolkit will provide you with the tools you need to have the necessary conversations with your IT team/supplier.
Read more Board Toolkit in modal dialogFree cyber security training to raise awareness and help school staff manage some of the key cyber threats facing schools. The training is available in two formats: a scripted presentation pack or group delivery can be found below in the […]
Read more Training for School Staff in modal dialog