Security awareness library

Our content library is updated with online training courses regularly, helping you deliver new and relevant training to every member of your organisation on a structural basis. The following topics are covered in our training courses.


The importance of security awareness

What is the importance of information awareness, what are the risks and consequences of employees’ actions and how important is the role of the individual employee in the field of information security and privacy?

Strong passwords

Information security starts with a strong password. How can one create strong passwords that are easy to remember? How can the login process be made as secure as possible with the use of MFA and password managers?


Phishing is the biggest digital threat that organisations face. What is phishing, how can one recognise phishing and how should one react?


What is the GDPR and how the law affects the employee's daily activities? What are personal data and how can data breaches be prevented?


How does one deal with personal data in one’s daily work? What data may and may not be exchanged?

The biggest dangers on the internet

Hacks, ransomware attacks and data breaches. We hear and read about them in the news every day. Dangers lurk everywhere. What is cybercrime and what dangers does it pose?

Safe surfing on the internet

We browse the internet daily. How does one browse the internet safely? How does one recognise malicious websites and URLs?

Secure connection (HTTPS)

Why is a secure connection (HTTPS) so important?

Mobile device security

We take our mobile devices everywhere we go. How does one handle these devices correctly and how does one ensure adequate protection?

Downloading apps safely

We make extensive use of apps on our phones and tablets. How does one know if an app is safe?

Safe use of Wi-Fi

How can one work safely while en route and how can one safely use Wi-Fi?

Information in the cloud

We increasingly work in the cloud. How does one use cloud services safely?

Social engineering

How does one recognise social engineering? What must one do when receiving suspicious phone calls and/or unknown visitors?

The safe computer

The computer is indispensable. What must one do and not do to make safe use of the computer and how should it be kept virus-free?

The safe workspace (at home), clean desk & clear screen

How does one contribute to a safe workplace (at home) where information is handled with care?

USB storage devices

Using USB storage devices is greatly convenient but it also carries risks. How can one use USB storage devices in a safe manner?

Destroying data

Information is worth gold to criminals. How does one destroy physical and digital information in a safe and correct way?

Business email compromise

Which methods do criminals use to (digitally) scam organisations? How can one recognise them and how should one respond?

MFA and password managers

How can the login process be made as secure as possible using MFA and password managers?

Social media

People post all kinds of information on social media. What can people share and what not? And how do they avoid sharing information that is potentially useful to criminals and how can they protect their own reputation and that of the organisation?

Knowledge tests

The knowledge of employees can be tested with short and challenging knowledge tests on the various topics covered in the training modules.