Cyber Security for Office Staff

by I Train Scotland Claim Listing

This course will greatly increase your awareness of cyber risks and provide you with simple and effective information to give you confidence in spotting and preventing these risks materializing.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

I Train Scotland Logo

img Duration

1 Day

Course Details

Cybercrime is a growing threat to UK business, these days it is a matter of when rather than if an attack will take place. Recent surveys by The Federation of Small Businesses (FSB) and the UK Government found that 66% of small businesses experienced cybercrime within the last 2 years while large businesses experienced cyber breaches or attacks at a rate of 65% over the last year.

Most, if not all, security breaches will involve some element of human error and investing in staff training is a key element to minimise the impact and costs of cyber risks to your business. Staff training and awareness programmes can also help reduce the cost of related insurance premium.

No matter your role within your workplace, you play a vital part in preventing cyber security incidents. This course will greatly increase your awareness of cyber risks and provide you with simple and effective information to give you confidence in spotting and preventing these risks materialising.

 

Course Goals:

By the end of this course delegates will:

  • Understand common cyber risks, their potential impacts on businesses and how they materialise
  • Review examples of cyber risks materialising
  • Understand the key topics, red flags and best practice in relation to preventing cyber risks materialising
  • Given guidance in actions to take if risks do materialise
  • Be sign posted to further useful sources of information
  • Be assessed on the to ensure, and re-enforce, competency on the course content

 

Topics:

Introduction

  • Define a cyber risk?
  • The perpetrators and their motives?
  • Dispelling Cyber security misconceptions
  • The role employees play

 

Common Cyber Risks

  • Social Engineering
  • Malware
  • Ransomware
  • Phishing
  • Spear Phishing
  • Business Email Compromise
  • Spoofing
  • Data Breaches

 

Impacts of Cyber Attacks

  • What are the impacts of successful cyber-attacks?
  • Example – Online banking fraud
  • Example – Ransomware
  • Example – Business Email Compromise

 

Passwords

  • The importance of passwords
  • What are the risks to passwords?
  • What happens when they are compromised?
  • Password bad habits
  • Password best practice

 

Email Security

  • Did you know, the 419 scam and why email is like a letter?
  • What are the threats?
  • Red flags – what to look out for?
  • The best practice steps to follow

 

Browser Security

  • What do we use them for?
  • Threats delivered through the browser?
  • Red flags - what to watch out for?
  • Browser Security – Best Practice

 

Company and Personal Data

  • How is it used against us?
  • What is out there and where?
  • Steps to take to minimise data loss?

 

Device Security

  • Software security
  • Physical security

 

Mobile Working

  • Device and physical security
  • Wireless networks
  • Mobile devices
  • Shoulder surfing

 

What to do when it goes wrong

  • Plan for the worst - training and processes
  • What actions should you consider taking?

 

Useful resources

  • Discussion of some useful resources available to delegates

 

Assessment

  • 15mins multiple choice assessment
  • Edinburgh Branch

    CBC House, 24 Canning Street, Edinburgh

Check out more Cybersecurity courses in UK

Texaport Logo

Cyber Security Training

Our certified training is an important step forward in creating and promoting a robust cybersecurity-focused culture across your business.

by Texaport [Claim Listing ]
Leeds City College Logo

SKILLUP To Cybersecurity

With the world’s continuously increasing reliance on technology, the threats to our systems become more sophisticated. This eight-week course will equip you with the knowledge to recognise potential threats and the skills to prevent them.

by Leeds City College [Claim Listing ]
Pitman Training Logo

CyberSecurity Analyst (CySa+)

In this course, you’ll learn how to analyse, monitor, and protect an organisation’s infrastructure using threat-detection and threat-analysis tools.

by Pitman Training [Claim Listing ]
Elite Training Logo

ETCYSE – An Introduction To Cyber Security

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. It’s an overview of how basic cyber-attacks are constructed and applied to real systems is also included

by Elite Training [Claim Listing ]
TSG Training Logo

Certified Cloud Security Professional (CCSP) Training Course

(ISC)² and the Cloud Security Alliance (CSA) developed the Certified Cloud Security Professional (CCSP) credential to ensure that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls

by TSG Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy