Back in shape after the holiday

Watch the video where Andy, Emily, and Beth return from vacation and encounter situations where they need to refresh their good IT habits.

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.

The course

About the course

Vacation is typically a time when we have a chance to slow down and disconnect from our daily work challenges. Unfortunately, our awareness of cybersecurity seems to fade as well. This course will reboot your attention to red flags and good habits. So, shake the beach sand off, and get back into tip-top cybersecurity shape.

Passwords

Want to learn more?

We use passwords to log into everything from Gmail to Facebook. That is why it is so important to create strong passwords and handle them in a secure way, since they can access so much of our personal information.  In this blog post, we will review how you can easily create strong passwords for every platform you use and discuss why it is so important to do so.

Want to learn more?

We use passwords to log into everything from Gmail to Facebook. That is why it is so important to create strong passwords and handle them in a secure way, since they can access so much of our personal information.  In this blog post, we will review how you can easily create strong passwords for every platform you use and discuss why it is so important to do so.
Passwords

Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.
In this way your employees willl be reminded of what to be aware of when they see a the posters.

phone scamming

You might also like..

Phone Scamming
Category: Cyber security

Phone Scamming

Learning objectives: how phone scams work, which red flags you should be aware of, and how to best handle unexpected phone calls.

Read more »
Processing personal data

Processing personal data

Learning objectives: What processing means in relation to personal data, when exactly you process data and what it means to grant other people access to personal data

Read more »
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.