Cybersecurity – Global
Product Description
Preventing Data Breaches
Everyone in the workplace has a role to play in information security. The first step in reducing the risk of data breaches is to learn what they are and be aware of how they typically occur, so that appropriate measures can be taken to prevent them from taking place in the future.
This course surveys the most common information security risks and breaches, including direct observation, malware viruses, phishing, identity theft, spam and credit card skimming. It explores how mobile devices such as laptops and phones are vulnerable to theft. It also considers the security risks associated with working remotely, as well as the personal and professional issues associated with online activities such as using social media or storing information in the cloud. Each topic is explored in plain English, followed by a clear explanation of simple strategies for protecting data.
What is cyber security awareness training?
We all have an essential role to play in keeping our businesses safe.
This is why we use cyber security awareness training: to clearly educate learners on the importance of preventing dangerous information security breaches that affect everybody in a team.
Cyber security training is a fundamental strategy that organisations can adopt to mitigate the risk of cyber- attacks.
Read the whole article here.
Why cyber security is important
Where cybersecurity is concerned, you are the weakest link
Australia’s dominant real estate listing portal, Domain, was hit by a cyber attack, where users’ personal details were accessed and used in scamming attacks. Domain announced “a scam that used a phishing attack to gain access to Domain’s administrative systems”. Fortunately, little or no actual damage was done.
Read the whole article here.
Related Cybersecurity Training
We offer this course in versions specifically targeted to the needs of organisations in different sectors:
Who should do this training?
This cyber security awareness training course is suitable for everyone responsible for handling information in the workplace, whether they are at work, at home or offsite.
Course Outline
- Module 1: Introduction
- Module 2: Protecting Work Information
- Module 3: At work, at home and offsite
Customise Course
Do you have a policy or process, or some subject-matter expertise that you would like to add to this course?
Talk to us about ways we can quickly tailor the course to suit your needs.