All employees in a modern company must know the essentials of information security in order to keep data confidential, available and free from unauthorised change.
Following the principles set out by the Payment Card Industry (PCI) council and ISO 27001 we will ensure that staff gain the required level of security awareness through our informative and lively courses.
We believe strongly that every employee should have targeted IT security training before they go into a working environment - and that this should be monitored and refreshed
after a specified period.
Click here to register an interest in a class.
Our training courses are rich in fascinating demonstrations and role play.
The following is not exhaustive, but demonstrates vulnerable areas that users must be aware of:
- How to detect that you - or your company - is being profiled / targeted
- Remember, the IT department has (hopefully) made it extremely difficult to hack into your data... so hackers are turning to much easier targets...YOU!
Protecting the company from software vulnerabilities
- Demonstration of the importance of keeping software up to date
Identifying viruses / trojans and what not to do
- Key loggers recording all your keystrokes
Which wireless networks to use - and keeping secure in internet cafes
- WEP encryption. What wireless router are you using?
Remote working best practices
- More and more people are working from home... and this is probably making your company vulnerable
What to look out for to ensure you are on the correct website.
- Click Jacking demonstrated
What not to divulge on the phone / facebook
- Hackers profile your company
- "I'm afraid he's on holiday in America for two weeks... can I help?" - should you really be saying that?
What not to include in job advertisements.
- Why let hackers know you require staff who must have SQL Server 2008 and Cisco CSA 5505 firewall knowledge?
How hackers make use of personal data found in the bin.
- Remember, we have nice clean recycle bins now... so much easier to sift through.
- The company may hire a data destruction service - but it's of little use if you're throwing company details away in your home bin.
- User profiling
Password best practice
- It is amazing how many people place passwords on monitors. This is generally because they have been made too complex.
- Even easier for the hacker is if you don't change your default password!
- We advise on password best practice. - Selecting complex passwords that are easy to remember.
Identifying email scams - and why never to reply.
- Even by opening and email saying you have won a million dollars - you can let a host of people know that you are susceptible to a scam?
- If it's too good to be true ... it probably is.
- It is highly likely that you have been tracked by a "web bug".
Who are you letting into your building and what can they see when the walk around?
- Probably much more than you think! Network diagrams, user password on yellow sticky labels...
Spam do's and don'ts
- What happens when you open spam mail?
Protecting the company from scams
- Is that email coming from where you thought it was?
Where is your data exactly?
- Is your private data on the secure password protected network conveniently backup up on an unsecured USB drive?