Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Little Book of Big Scams

Little Book of Big Scams

This booklet outlines a number of the most common online frauds and scams. It includes information on how to identify the various types of fraud and provides advice to prevent the loss of your data.

Related resources

Social Media Marketplace Fraud Guide

This guide highlights how fraudsters exploit social media marketplaces to trick users into buying or selling items that either don’t exist or aren’t as advertised – whether that’s goods, tickets or other services. It outlines what to watch out for, […]

Read more Social Media Marketplace Fraud Guide in modal dialog

Check Your Cyber Security

This free government service for UK organisations performs a range of simple online checks to identify common vulnerabilities in your public-facing IT. All checks are remote, without the need to install software and uses the same kind of publicly available […]

Read more Check Your Cyber Security in modal dialog

Youth Work and Cyber Resilience – What Young People Said

Research report into young people’s experiences of issues in the digital world and the role of youth work in supporting young people to develop cyber resilient practices.

Read more Youth Work and Cyber Resilience – What Young People Said in modal dialog

Cyber Training for Staff

Free e-learning training introduces why cyber security is important and how attacks happen. It will give you actionable advice about how to defend yourself.  The NCSC’s e-learning package ‘Top Tips For Staff’ can be completed online, or built into your […]

Read more Cyber Training for Staff in modal dialog

Guidance on effective communications in a cyber incident

Supporting organisations of all sizes to manage their communications strategy before, during and after a cyber security incident.

Read more Guidance on effective communications in a cyber incident in modal dialog
Back to top of the page