top of page

Basic Cyber Awareness Training

 

 

Delivery Method  (Online or Classroom)

 

  • Cyber Security Executive Briefing

  • Basic Cyber Awareness

  • Advanced Cyber Awareness

  • Celebrity/VIP Awareness

  • Cyber Forensics First Responder

 

 

Online - Our basic online courses provide that extra level of flexibility and are delivered to organisations worldwide.

 

This method of learning is highly successful for large organisations wanting to create a level of awareness within their organisation. It uses blended learning techniques with the use of media and video and tests, building a level of awareness to a large audience in a very short space of time.

 

Our basic online courses can be tailored to your organisations needs but typically last between 15-60min.

 

Classroom - All our courses are delivered by industry experts.

​

 

INTRODUCTION - THE WEB MINDSET

To enable people to recognise what data leakage on the Internet is and how it can be minimised to protect what they do online.

 

What do you want to use the Internet for and what does the Internet want to use you for?!

 

Advertising, malware, phishing etc, etc Your web footprint (Signing into Gmail, how does this affect your searches and collected data about you?) Google Analytics and data captures Tabbed Browsing and handshaking Cleaning your cookies - Why? What benefits?

 

SAFEGUARDING YOURSELF ONLINE

​Enable employees to understand security online and data leakage through social media examining personal, family and work accounts Social Networks (safe use of social media) - Simple to complex ie Security Settings, what you post, who can see? Being Tagged by others - Family, Friends (Their settings can affect yours) Your footprint - Your families footprint (what personal details exist for you all and those associated with you ie directories, eBay, email, phone numbers) - Search for yourself exercise Location posts - checking in, (4Square etc) showing patterns (social, work, family...all make you vulnerable)

 

Work Networks (Linked In) - Why do you use it? - Looking at other individuals/companies? What do you give away by searching? What do you put on it? Self-Assessment Phase 1. Search Online 2. Search Social Networks (individual, close family) 3. Search Work Networks.

 

SAFEGUARDING YOUR DEVICES

Enable staff to understand what vulnerabilities exist around mobile devices and risk to the corporation Personal & Work - Do you carry them both all the time? What security do you have on them? Pin lock? 10 attempts and then the phone is wiped enabled? Find my iPhone etc (Android alternatives) DEVICES What does your device give away about you? Siri" (Expand Data Leakage) calendars etc "Ok Google" BACK UPS Cloud Microsoft 365 iTunes (what syncs?...with what?) Corporate vs Home sharing - Best of Both Worlds?

 

INTERNET SECURITY

Enable staff to understand what risk exists around unsolicited emails and sources Of malware and subsequent risk to the individual and/or corporation Common Sense vs Targeted Commercial Malware Common Sense - Emails (Spam, Spoofing, Phishing, Spear Phishing) Email attachments (authenticity & verification) - Know your audience, if in doubt, don't open it!

 

Targeted Malware or Non Targeted Malware Types of Malware (examples including commercial and private file targeted Cryptolockers) Sources of compromise- Pornography, children using your devices! Not having antivirus or malware installed - computer and phone (android) Common sense still applies

 

DUE DILIGENCE

Enable staff to conduct a limited check of companies, organisations and individuals with whom they engage with to enable a determination of risk to the corporation

 

Overview of Due Diligence - What checks can be done against: companies organisations individuals

​

​

​

 

INTELLIGENCE | INTEGRITY | INNOVATION
  • Grey Twitter Icon

New RAA Ransomware is created entirely using Javascript: … via http://www.bleepingcomputer.com/news/security/the-new-raa-ransomware-is-created-entirely-using-javascript/ - (@Intellectcyber) June 13, 2016

                    © 2016 Intellect Intelligence Services

Privacy Policy.  This web site is ICO compliant.  No cookies are saved during your access to this site.  Personal data is only stored when you enter a contract with Intellect Intelligence.  For information on cookies visit tinyurl.com/gww5jvyv

bottom of page