- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Data protection
Information on how to legally protect personal information.
Information on how to legally protect personal information.
This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]
Read more Cryptocurrency Scam Guidance in modal dialogReporting a cyber security incident to NCSC.
Read more Reporting a cyber security incident to NCSC in modal dialogThis month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs […]
Read more CyberByte – October 2025 in modal dialogSextortion is a type of cyber-enabled extortion which involves the threat of sharing sexual information, images or clips to extort money from you, whether images actually exist or not. Police Scotland have advice on what you can do to reduce […]
Read more Sextortion in modal dialogA free, 90 minute non technical workshop which helps organisations find out how resilient they are to cyber attacks and practise their response in a safe environment.
Read more Exercise in a Box workshops in modal dialogThe NCSC’s response, reports and advisories on cyber security matters affecting the UK.
Read more Reports and Advisories in modal dialog