This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]
Read more Cryptocurrency Scam Guidance in modal dialog
This guide explains how scammers use email, texts, and phone calls to steal personal or financial information. It highlights common tactics, warning signs and practical steps to protect yourself, helping readers recognise and respond to these everyday cyber threats.
Read more Guide to Phishing, Smishing and Vishing Scams in modal dialog
This programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]
Read more Executive Education Training: Cyber Security in modal dialog
This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs […]
Read more CyberByte – October 2025 in modal dialog
Cyber Essentials is an effective, Government backed scheme that will help you to protect your organisation, whatever its size, against a whole range of the most common cyber attacks.
Read more Cyber Essentials in modal dialog
Sextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]
Read more Sextortion Guidance in modal dialog