
How to Handle a Phishing-mail
Learning objectives: A refresher on phishing e-mails and the do’s and don’ts when you receive a suspicious e-mail.
Watch the video from our Protect Personal Data course, where Kurt puts some personal data on a USB drive then loses it on his commute, which leads to a security breach.
You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.
Many organisations have made rules and guidelines for how to handle personal data to avoid security breaches. However, they are only effective if everyone takes it seriously and complies with them. In this course, we focus on what we can do in our everyday work life to succeed in protecting personal data.
An information security is an important tool to achieve and maintain a good information security culture, which includes pointers on how to handle personal data. In this blog post, we will guide you how to create an information security policy for your organisation.
An information security is an important tool to achieve and maintain a good information security culture, which includes pointers on how to handle personal data. In this blog post, we will guide you how to create an information security policy for your organisation.
Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.
In this way your employees willl be reminded of what to be aware of when they see a the posters.
Learning objectives: A refresher on phishing e-mails and the do’s and don’ts when you receive a suspicious e-mail.
Learning objectives: How security breaches can occur in video conferences and what to be aware of to avoid security breaches
Learning objectives: What a unknown network is and what security risks are present when using unknown networks
CyberPilot ApS
Fredens Torv 8, side building 1, 8000
Aarhus
+45 40 32 32 35
E-mail: info@cyberpilot.io
Copyright © 2020
CyberPilot
Icon credits: Streamlineicons.com