Cyber security is not solely the responsibility of the IT department. As technology develops and the technical resilience of our networks improves, cyber criminals are looking for the easy option, our people.
How often have you either worked in or visited an office with the shared password on a ‘Post-It note’ attached to a screen?
When a contractor arrives requesting office access to a repair a fault, how often do you challenge and check they are who they say they are?
People are busy, yet they are the most precious asset for your business and equally to the cyber attacker.
This course will ensure that you and your team are aware of the many methods cyber attackers use to illicit critical information and data.
Delegates will learn to:
- Understand the various methods used by cyber criminals to illicit critical information.
- Be aware of the risk of external links and the importance of reporting anything that seems out of the ordinary.
- Question the unexpected and check and test information to confirm accuracy.
- Be a further line of defence and ensure that your company is protected and continues to provide great service to your customers.
We deliver this course on a bespoke basis to meet the needs of your business operations. Get in touch to discuss your business requirements with one of our team.