Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource SIM Swap Guidance

SIM Swap Guidance

This guide explains how criminals can hijack your mobile phone number by tricking your provider into switching your service to a SIM card under their control. Once they have your number, they can intercept calls and texts – including the one‑time passwords used by banks and other services – and potentially access your accounts.

It also outlines key warning signs and provides practical steps you can take – like contacting your network operator immediately if things look strange, tightening account security and being careful about what personal details you share online.

Related resources

Sextortion Guidance

Sextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]

Read more Sextortion Guidance in modal dialog

Cyber Security Advice: Businesses and Charities

What is cyber security? This guide covers steps to protect your data and devices, includes information on how to report a cyber crime and covers why you should get Cyber Essentials.

Read more Cyber Security Advice: Businesses and Charities in modal dialog

The UK Cyber Security Council

The UK Cyber Security Council is the self-regulatory body for the UK’s cyber security profession. It develops, promotes and stewards nationally recognised standards for cyber security in support of the UK Government’s National Cyber Security Strategy to make the UK […]

Read more The UK Cyber Security Council in modal dialog

CyberByte – September 2025

This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]

Read more CyberByte – September 2025 in modal dialog
Back to top of the page