Safe surfing

Watch the video from our Safe Surfing course, where Lou downloaded a free template of a questionable website and infects his company’s network with malware.

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.

The course

About the course

This course will give you a few real-life scenarios where you could fall victim to malware. There are even some warning signs that we have gotten used to ignoring. Finally, we will provide you some concrete tips on how to safely surf the net.

Safe surfing

Learn more

Because we use the internet so extensively at work, it means that hackers and cybercriminals could be a threat to all organisations. Knowing how to stay safe is vital, both during private use and for work. In this blog, we discuss how blindly browsing can lead to mishaps from GDPR violations to malware. We also give some real-life examples on what to be aware of when browsing the internet.

Learn more

Because we use the internet so extensively at work, it means that hackers and cybercriminals could be a threat to all organisations. Knowing how to stay safe is vital, both during private use and for work. In this blog, we discuss how blindly browsing can lead to mishaps from GDPR violations to malware. We also give some real-life examples on what to be aware of when browsing the internet.

Safe surfing

Other material

Create awareness in your organisation with our posters. You can download the posters and hang them on your walls in your organisation.

In this way, your team will be reminded of what to be aware of when they see the posters.

cp poster

Related courses

Phone Scamming
Category: Cyber security

Phone Scamming

Learning objectives: how phone scams work, which red flags you should be aware of, and how to best handle unexpected phone calls.

Read More »
Processing personal data

Processing personal data

Learning objectives: What processing means in relation to personal data, when exactly you process data and what it means to grant other people access to personal data

Read More »
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.