Advice and guidance

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Social Engineering Guidance

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such attacks.

Related resources

Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure

Outlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.

Read more Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure in modal dialog

CyberByte – September 2025

This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]

Read more CyberByte – September 2025 in modal dialog

Cyber Essentials Certificate Search

The IASME Cyber Essentials Certificate Search is to verify the Cyber Essentials and Cyber Essentials Plus certification of an organisation. Use this to check whether an organisation holds Cyber Essentials certification to support supplier assurance.

Read more Cyber Essentials Certificate Search in modal dialog
Back to top of the page