Introduction to Cyber Security
Protecting your organisation from the increasing threat of cyber-attacks and data breaches can be challenging. Your employees are a crucial line of defence. It is critical to ensure that they understand their security responsibilities and how to spot a cyber threat.
Phishing is a cybercrime in which individuals are contacted via email, telephone or text message by someone posing as a legitimate institution. This is done to trick individuals into providing sensitive data such as personal identifiable information, this includes banking and general website passwords.
Did you know that about 91% of successful data breaches started with a phishing attack?
Cyber Security Training
We live in a world filled with various risks and as business leaders we do our best to protect our businesses against the myriad of risks out there. We implement excellent physical barriers, including electric perimeter fences, stringent access control and guarding systems. It is essential to keep out intruders who wish to steal from our businesses right? But what about intruders that you cannot see? Intruders that are constantly trying to get access to your data and software. I know that if our servers were hacked or a virus got into our software, our business will literally be crippled!
Just the thought of it scares me! If your business was hacked and criminals held you to ransom, do you have a backup plan? Are all your team members fully aware that they are individually being targeted every day, multiple times day, enticing them to click on that oh-so-authentic looking “PO” or “RFQ” or “Payment Proof” plus a host of other “hooks”.
Will they know how to identify these criminal attempts? Think about it this way: Your businesses are impenetrable physical defence systems. But, what if the criminal that comes in via the front door is so well disguised that your security lets them in freely. Once they’re in, the damage they could do is unimaginable!
So, in the data world, we need to empower, educate, and constantly train our team to have their guard up for all technology threats/criminals that are relentless in their efforts to steal your data and hold your business to ransom. We see these hacks happening every day, all over our country, all over the world. So, this comprehensive data security training program is specifically designed to train your team on every possible attempt to breach your security. It will help you protect your business against the increasing attempts to get into your systems. These modules are short animated videos that will expertly guide your team through the complexities in a simple, easy-to-understand and high impact manner.
Our Cyber Security awareness training is designed to educate you about matters relating to information security. This training aims to raise awareness of the various potential internal and external security risks to your organisation, including email scams, malware, weak passwords, and insider threats. Staff won’t be happy if you dump another 20 hour training session onto them, that’s why we kept each lesson short and informative. We consulted with educators, students, cybersecurity experts and quality assurance ISO 9001 auditors to ensure this course gives you great value and is presented in an EASY to learn way.
What’s wrong with using the same password EVERYWHERE?
Has your password been leaked online?
How to choose a password?
Why you should STOP saving your passwords in your browser!
Think Before You Share Your Password.
What is Vishing?
What is a Password Manager and how to use it.
What is Two-factor authentication (2FA)
Travel Scams – Don’t get caught!
OVER 35+ LESSONS
Cyber Security Training for Staff MADE EASY!
SAMPLE ANIMATION LESSON
SAMPLE TRAINING LESSON
FREE POPI TOOLKIT
The majority of South African companies / organisations are required to abide by the Protection of Personal Information Act (POPIA), often known as the POPI Act.
Under POPI, it is against the law to gather, utilise, or store a customer’s or business’s personal information unless it complies with the rules and prohibitions outlined in the Act.
Our FREE POPI Toolkit includes every template, policy, procedure, form, and agreement required, along with step-by-step instructions and an action plan to make the POPI compliance process easier for you.
You can save thousands in consultant fees, policy and contract writing time, and other costs by using the FREE POPI Act Compliance Toolkit.
The toolkit will be made available to you via a download link after you have completed your purchase of ANY of our cybersecurity courses.
Documents included in your POPI Toolkit:
- POPI Act Compliance Checklist
- Popi Manual
- Information Officer Appointment Letter
- Employee POPI Consent & Notice
- Client POPI Consent & Notice
- And more
*documents supplied electronically..