News

incident icon
GUIDANCE

Multi-factor authentication for your corporate online services

Advice for organisations on implementing strong methods of multi-factor authentication (MFA) for accessing corporate online services. This guidance describes how administrators responsible for managing access to online digital services for their organisation can apply the strongest types of multi-factor authentication […]

incident icon
GUIDANCE

Travel Scams and How to Avoid Them: Tips for spotting and avoiding common travel-related scams

As the summer sun beckons and holiday plans take shape, the excitement of travel can sometimes overshadow the need for vigilance. Unfortunately, scammers are always on the lookout for unsuspecting travellers. From fake booking websites to phishing emails, these cyber threats can turn your dream holiday into a nightmare.

incident icon
GUIDANCE

Protecting Your Devices on Holiday: Best practices for securing your devices while traveling

As you prepare for a summer holiday filled with adventure and relaxation, it’s essential to consider the security of your digital devices. From smartphones to laptops, these devices hold valuable personal information that can be vulnerable to cyber threats when you’re away from home.

incident icon
CAMPAIGN

New Secure Summer campaign launched by the CyberScotland Partnership

Summer is a time for relaxation and adventure, but it can also be a prime opportunity for cyber criminals to strike. It’s important to stay vigilant of the potential cyber threats during the summer months to prevent your plans from being disrupted. This is why the CyberScotland Partnership has launched the “Secure Summer: bright days, safe ways” campaign.

incident icon
GUIDANCE

Phishing scams: Different forms of phishing

Phishing is when criminals attempt to trick people into doing ‘the wrong thing’, such as clicking a link to a suspect website. Phishing can be conducted via a text message, social media, or by phone, but the term ‘phishing’ is mainly used to describe attacks that arrive by email.

This article breaks down some of the various phishing methods used by cyber criminals.

Back to top of the page