The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialog
This Framework sets out Scotland’s vision for a cyber resilient Scotland and includes refreshed action plans.
Read more The Strategic Framework for a Cyber Resilient Scotland in modal dialog
Resources to build cyber resilience into youth work practice including some resources developed across the sector.
Read more Building cyber resilience in modal dialog
Outlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.
Read more Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure in modal dialog
Guidance for suppliers on how to embed use of the Cyber Security Procurement Support Tool into the procurement process.
Read more CSPST: Guidance for suppliers in modal dialog
This guide highlights how fraudsters exploit social media marketplaces to trick users into buying or selling items that either don’t exist or aren’t as advertised – whether that’s goods, tickets or other services. It outlines what to watch out for, […]
Read more Social Media Marketplace Fraud Guide in modal dialog