Give your team the skills they need to stay up to date and compliant with the Australian Government’s Cyber Security Centre’s Essential 8 across ten 15-minute modules they can do at their own pace.
Password security
Password best practices play a pivotal role in securing digital assets, as strong and unique passwords for each account, coupled with multi-factor authentication, can thwart unauthorised access attempts.
Phising indicators & prevention
Recognising and avoiding phishing attacks, being cautious about downloading attachments or clicking on links, and steering clear of suspicious websites can significantly reduce the risk of malware infections and other cyber threats.
Websites & software
The importance of recognising risks posed by malicious websites and software, teaching users to identify these potential threats and offering practical guidelines for maintaining safe browsing habits, mitigating cyberattacks, and enhancing overall online security.
Malware
Delving into malware types and polymorphic variants aswell-as educating users on detection methods. Exploring typical attack patterns, empowering individuals to recognise and prevent malware-related incidents.
Ransomware
Introduces encryption concepts, examines various types like scareware and provides strategies to avoid attacks. Empowering users to better understand and navigate ransomware threats to ensure better data protection.
Social media safety
Being mindful about the information shared online, maintaining strict privacy settings, and avoiding interactions with unknown individuals can minimise the risks associated with data leakage or cyberstalking.
Social engineering prevention
Educating individuals about deceptive tactics, promoting critical thinking, implementing multi-factor authentication, and fostering a security-conscious organisational culture to thwart manipulation and unauthorised access.
Incident reporting and response
An effective incident reporting and response protocol enables organisations to quickly detect and address potential security breaches, thus mitigating their impact on operations and reputation.
Compliance
Covering key regulations, such as GDPR, HIPAA Privacy & Security, PCI DSS and Data Breach Notification under the Data Protection Act to equip individuals with essential knowledge to maintain legal and regulatory standards.
Physical security measures
Physical security measures should not be overlooked, as they provide a strong foundation for digital security. Ensuring that workspaces are secured, implementing access controls, and being vigilant about the disposal of sensitive documents can prevent unauthorised individuals from gaining access to critical systems or data.