- Level 1 - No technical knowledge required
- Level 2 - Moderately technical
- Level 3 - Technical
Support to help understand and solution technical challenges
Support to help understand and solution technical challenges
This guidance helps small to medium sized organisations deal with businessemail compromise (BEC). It provides actions to help businesses reduce thelikelihood of being affected by BEC, and includes steps to take if you think yourorganisation has already been compromised.
Read more Business email compromise: defending your organisation in modal dialogResource to support with Cyber Essentials readiness and certification.
Read more The Cyber Essentials Guide to Working with an External IT Company in modal dialogSextortion is a type of cyber-enabled extortion which involves the threat of sharing sexual information, images or clips to extort money from you, whether images actually exist or not. Police Scotland have advice on what you can do to reduce […]
Read more Sextortion in modal dialogInformation on the different types of fraud and advice on how you can avoid becoming a victim.
Read more Scams and Frauds in modal dialogSextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]
Read more Sextortion Guidance in modal dialogThis resource helps smaller organisations prepare for a cyber incident and gives a ste-by-step guide on how to deal with it.
Read more Incident response template in modal dialog