Outlines the policy and procedure for Scottish Cyber Coordination Centre (SC3) to alert and, where appropriate, coordinate responses from the Scottish public sector organisations, to cyber-attacks that exploit a previously unknown vulnerability.
Read more Scottish Cyber Coordination Centre – Vulnerability Coordination: Policy and Procedure in modal dialog
Proposing a series of 12 principles, designed to help you establish effective control and oversight of your supply chain.
Read more Supply Chain Security Guidance in modal dialog
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog
Top tips to follow to avoid falling victim to holiday fraud.
Read more Holiday Fraud in modal dialog
Guidance for buyers on embedding use of Cyber Security Procurement Support Tool into the procurement process.
Read more CSPST: Guidance for buyers in modal dialog
We live in a digital world, but some people remain excluded. Digital inclusion is the process of providing the tools and access for those that are excluded.
Read more Digital inclusion in modal dialog