Our content library is updated with online training courses regularly, helping you deliver new and relevant training to every member of your organisation on a structural basis. The following topics are covered in our training courses.
What is the importance of information awareness, what are the risks and consequences of employees’ actions and how important is the role of the individual employee in the field of information security and privacy?
Information security starts with a strong password. How can one create strong passwords that are easy to remember? How can the login process be made as secure as possible with the use of MFA and password managers?
Phishing is the biggest digital threat that organisations face. What is phishing, how can one recognise phishing and how should one react?
What is the GDPR and how the law affects the employee's daily activities? What are personal data and how can data breaches be prevented?
How does one deal with personal data in one’s daily work? What data may and may not be exchanged?
Hacks, ransomware attacks and data breaches. We hear and read about them in the news every day. Dangers lurk everywhere. What is cybercrime and what dangers does it pose?
We browse the internet daily. How does one browse the internet safely? How does one recognise malicious websites and URLs?
Why is a secure connection (HTTPS) so important?
We take our mobile devices everywhere we go. How does one handle these devices correctly and how does one ensure adequate protection?
We make extensive use of apps on our phones and tablets. How does one know if an app is safe?
How can one work safely while en route and how can one safely use Wi-Fi?
We increasingly work in the cloud. How does one use cloud services safely?
How does one recognise social engineering? What must one do when receiving suspicious phone calls and/or unknown visitors?
The computer is indispensable. What must one do and not do to make safe use of the computer and how should it be kept virus-free?
How does one contribute to a safe workplace (at home) where information is handled with care?
Using USB storage devices is greatly convenient but it also carries risks. How can one use USB storage devices in a safe manner?
Information is worth gold to criminals. How does one destroy physical and digital information in a safe and correct way?
Which methods do criminals use to (digitally) scam organisations? How can one recognise them and how should one respond?
How can the login process be made as secure as possible using MFA and password managers?
People post all kinds of information on social media. What can people share and what not? And how do they avoid sharing information that is potentially useful to criminals and how can they protect their own reputation and that of the organisation?
The knowledge of employees can be tested with short and challenging knowledge tests on the various topics covered in the training modules.