Protect Your Computer

Watch the video from our Protect Your Work Computer course, where Markus shows us exactly what not to do with our work computers!

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.

The course

About the course

Cybercriminals typically attack the weakest link in the chain. This is normally a computer or device that has not been protected adequately. In this course, we discuss the many ways that people often leave their devices in a vulnerable state and how you can keep your computer safe.

supervane

Summary for blog

Working from home has become more of a norm, but it has also emphasised the importance of having good cybersecurity habits. In this blog, we will give you some tips on how to keep your computer safe, even at home.  

Summary for blog

Working from home has become more of a norm, but it has also emphasised the importance of having good cybersecurity habits. In this blog, we will give you some tips on how to keep your computer safe, even at home.  

supervane

Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.

In this way your employees willl be reminded of what to be aware of when they see a the posters.

cp poster

Related courses

Top