Cyber Crime

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource CyberByte – September 2025

CyberByte – September 2025

This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under immediate anxiety and pressure to the point they believe the threat and engage with the cybercriminal. This often leads to the victim being manipulated into doing things they wouldn’t ordinarily do and in turn feeling isolated and too embarrassed to seek support.

We strongly encourage the reporting of any incident as this will help support the victim, so they are not facing the ordeal alone and to know there is a network around them to help them.

Whilst being online is generally a positive experience, unfortunately, we cannot forget we can be targeted.

Related resources

Police Scotland’s Cyber Security Strategy 2020

This strategy sets out how Police Scotland will take a proactive approach to respond to cyber demand, ensuring that we are future focused and able to adapt our policing model to suit the needs of the communities they serve.

Read more Police Scotland’s Cyber Security Strategy 2020 in modal dialog

Training for Small Organisations and Charities

The training demonstrates how you can improve your organisation’s resilience, and covers five key areas. You’ll explore each of these topics by navigating several encounters a small business owner may have with cyber security over the course of a week, […]

Read more Training for Small Organisations and Charities in modal dialog

Exercise in a box

Exercise in a box is an NCSC online tool which helps organisations find out how resilient they are to cyber-attacks and to help them practice their response. The service provides exercises, based around the main cyber threats which your organisation […]

Read more Exercise in a box in modal dialog
Back to top of the page