This guidance helps small to medium sized organisations deal with businessemail compromise (BEC). It provides actions to help businesses reduce thelikelihood of being affected by BEC, and includes steps to take if you think yourorganisation has already been compromised.
Read more Business email compromise: defending your organisation in modal dialog
This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]
Read more CyberByte – September 2025 in modal dialog
This guide explains how to create strong, unique passwords (for example using three random words) and why you should never reuse passwords across accounts. It also introduces Two‑Step Verification (2SV) – also called Two‑Factor Authentication (2FA) – as a vital […]
Read more Passwords & Two-Step Verification in modal dialog
This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]
Read more Social Engineering Guidance in modal dialog
Free e-learning training introduces why cyber security is important and how attacks happen. It will give you actionable advice about how to defend yourself. The NCSC’s e-learning package ‘Top Tips For Staff’ can be completed online, or built into your […]
Read more Cyber Training for Staff in modal dialog
A directory to help you find a Scottish company that are delivering data driven digital products and services. This resource is for the industry, the public sector and wider Scottish economy, helping to locate the right suppliers and showcasing the […]
Read more Data Directory in modal dialog