WHY DO COMPANIES NEED CYBER SECURITY AWARENESS TRAINING?
Cyber awareness training empowers learners to:
- believe that threats are real.
- identify what the threats are.
- recognise who the threat actors are.
- understand what their motives are, what they value, and why.
- discover the (virtual) places and situations that pose the greatest dangers.
- create policies that minimise cyber risks.
- ensure business continuity.
Discover exactly what happens, not only from the victim’s point of view but also from the attacker’s perspective. This promotes a much more holistic and mindful approach in our learners to recognise and identify the cyber threats they may encounter. Sencode’s teaching philosophy focuses on this core principle.
This course also aims to provide companies and individuals with a general understanding of modern information security threats. You can pick and choose which training elements best suit your business requirements. We tailor quotes to your specific security needs and understand that not all companies require the same cyber awareness training.
This module is an in-depth overview of the relationship between threats, vulnerabilities, and how they amount to risk. It identifies the major threats to business, how you can create policies to defend against these threats, and how common vulnerabilities occur due to the mismanagement of company infrastructure and business-critical systems.
Physical security is more than just walls and locked doors. It includes CCTV surveillance, security personnel, biometrics and access control. Because physical data theft (the theft of computers, laptops, portable electronic devices, electronic media and paper files) is one of the most common security breaches, having good physical security practices in place can often be all that stands between you and a data breach. This module highlights the top ten physical security considerations and paves the way for policy.
The General Data Protection Regulation came into force in May 2018 and continues to change businesses’ handling of personal data to this day. It comes with financial penalties and, in some cases, personal Director liabilities; something none of us can take lightly. Whilst the predecessor to the UK’s Data Protection Act (2018) lacked in severity, this certainly isn’t the case with GDPR, and after Brexit, The U.K’s own GDPR equivalent is set to change further. Understanding data protection law has never been more important, and this module covers the essentials.
The strength of passwords as an authentication control is more important than ever before. Cyber-criminals are increasingly using automated password cracking tools to identify passwords in a matter of seconds. This module will outline the best practices for creating and maintaining the most secure and easy to manage passwords, whilst eliminating the bad habits we have all unwittingly been taught through years of poor password evolution.
Companies are increasingly understanding the importance of 2FA. We cover security questions, challenge and response mechanisms and generic website 2FA to ensure that, even if an attacker gets hold of your passwords, they are still not going to gain access to your accounts.
Understand the tricks of social engineers and how they use psychological manipulation to trick people into performing actions or divulging confidential information. Social Engineers exploit vulnerabilities in human behaviour and aim to influence people for the purpose of information gathering, gaining system access, or simply to tarnish a company’s reputation.
We are all aware of the phishing techniques that criminals use to obtain sensitive information these days. Attackers are resorting to more cunning and invasive techniques to extract our information. Consequently, we can no longer trust our emails even if they appear to be coming from a reputable source. Phishing attacks have risen an unprecedented 667% in the UK compared to February 2020. Learn how to spot the various types of phishing emails and what are the best policies for mitigating these threats.
We deep dive into the security of wireless networks, how attackers can obtain your password over the air so that they may be cracked offline. Also, we cover the network security implementations that can be put in place to enhance the wireless segment of your organisation.
This module covers the techniques used by OSINT experts to extract as much information about a person as possible. This goes hand in hand with the tactics of the social engineer. It is astonishing; the amount of information that can be extracted online using targeted techniques. How secure is your social media profile? Are you posting too much information about your companies infrastructure in job posts? These are the questions we will explore. This module includes a live demonstration from our resident OSINT expert. How much information can he find about you?
As more people across the world turn to home working in an effort to combat the spread of the covid 19 pandemic, we explore the potential data concerns and cyber security consequences of providing employees remote access to IT systems and offer simple solutions and best practices to reduce risk.
Understand how attackers craft their exploit code to include a payload. This module includes live examples of what happens when an attacker takes control of your machine.
Use our interactive contact form or talk to us to find out more about our cyber awareness training.