Don't get caught out, bring your frontline teams up to speed today.
We live in an era of cyber insecurity and attacks are common, be it malware, viruses or hacking. But the reality is most events happen because of the action employees take. Most people have yet to consider their digital safety (especially at work) in the same way that they consider their personal safety. People wouldn’t leave their wallets or personal belongings lying around in a public space, but have almost definitely clicked on a link that didn’t seem totally safe or downloaded something from an unknown source.
These four courses cover the essentials of Cyber Security and are availabe individually or as a set.
Click the arrows to the left of the module titles to find out more.
Learn some simple rules you can follow to avoid being an easy target. Cyber security is about getting the basics right and this course will show you how.
- Trailer: ‘start with the why’
- How to Keep a Clean Machine
- Phishing & Social Engineering
- The Signs of an Infected Machine
Take me to this Module now - click HERE
This online data protection course is designed to help businesses and individuals comply with the essential principles of the Data Protection Act 1998.
The course explains what is expected of people who handle personal data, including information on how to keep data secure, what to do if data is lost and how to handle subject access requests. Topics include:
- Introduction - background of data protection, key definitions from the Data Protection Act.
- The Eight Principles of Data Protection – an explanation of each of the eight principles of the Data Protection Act.
- Exemptions – details who is except from the Data Protection Act.
Take me to this Module now - click HERE
Learn the basics of the PCI security standards and how to comply with them.
- What is PCI DSS and who needs to comply?
- Resonsibilities and vulnerabilities
- PCI DSS goals and requirements
- Card transaction risks
- Protecting customer data while transferring information
- Taking payments over the phone
- Keeping F2F payments secure
Take me to this Module now - click HERE
Learn how to make the right choices and help you understand how a social media policy can protect you
- Introduction; What is Social Media
- Social Media statistics
- Purpose of a Social Media Policy
- 10 important rules to stay safe
Take me to this Module now - click HERE
The browse mode allows you to view the course without recording assessment scores or completion status.
You should only use this mode if you are simply reviewing the course content. In order to complete this course you should click the Launch button instead.
Click 'OK' to continue in browse mode or 'Cancel' to return to the course details page.
Are you sure you want to re-launch this course?
Re-launching will remove your score and completion status!
Click below to re-launch or 'Cancel' to abort.
Thank you, the request has been registered. Please note: if the request is not approved within 30 days it will automatically lapse and will need to be ordered again.
This item will be permanently deleted and any history will be lost.
Are you sure you wish to proceed?
Please confirm the course enrolment for:
After confirmation you be will contacted separately regarding invoicing.