- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Support to help understand and solution technical challenges
Support to help understand and solution technical challenges
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialogReporting a cyber security incident to NCSC.
Read more Reporting a cyber security incident to NCSC in modal dialogWant to update your knowledge and skills on how to stay safe and secure in an online environment? This quick fire series of e-learning modules is for you. Created with youth workers in mind, each short section introduces a key […]
Read more Cyber Resilience Basics in modal dialogOutlines the procedures for notifying and coordinating responses to notifiable cyber incidents affecting Scotland’s public services. It defines the agreed-upon cyber incident notification process adopted by the Scottish public sector since 2018.
Read more Public Sector Cyber Incident Co-ordination Procedure in modal dialogThe use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]
Read more Remote Access Fraud in modal dialogA public sector tool for the improvement of cyber security in the supply chain.
Read more CSPST: Cyber Security Procurement Support Tool in modal dialog