Advice and guidance

Related resources

Passwords & Two-Step Verification

This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]

Read more Passwords & Two-Step Verification in modal dialog

Cyber Resilience Basics

Want to update your knowledge and skills on how to stay safe and secure in an online environment?  This quick fire series of e-learning modules is for you.  Created with youth workers in mind, each short section introduces a key […]

Read more Cyber Resilience Basics in modal dialog

Public Sector Cyber Incident Co-ordination Procedure

Outlines the procedures for notifying and coordinating responses to notifiable cyber incidents affecting Scotland’s public services. It defines the agreed-upon cyber incident notification process adopted by the Scottish public sector since 2018.

Read more Public Sector Cyber Incident Co-ordination Procedure in modal dialog

Remote Access Fraud

The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]

Read more Remote Access Fraud in modal dialog
Back to top of the page