Protect Your Work Computer

Watch the video from our Protect Your Work Computer course, where Markus shows us exactly what not to do with our work computers!

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.



About the course

Cybercriminals typically attack the weakest link in the chain. This is normally a computer or device that has not been protected adequately. In this course, we discuss the many ways that people often leave their devices in a vulnerable state and how you can keep your computer safe.

CTA_e-book_blog-desktop




Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.

In this way your employees willl be reminded of what to be aware of when they see the posters.

Go to posters

Course details
Time to complete: 5-6 minutes
Learning objectives
  • Why it is important to protect your work computer
  • The Do's and Don’ts of keeping your computer safe

You can access the entire course on our e-learning platform or create an account

Try for free Log in