Start typing to search across courses, articles, and pages.

General

Cyber Security at Work

Course Overview

This eLearning course focuses specifically on the cyber security threats and best practices that are relevant to employees in their day-to-day work. Rather than covering cyber security in abstract terms, the course addresses the real situations that employees encounter, providing practical and actionable guidance on how to stay secure while carrying out their normal duties.

The course begins by examining the impact of cyber crime on businesses and individuals, including the financial costs, reputational damage, and regulatory consequences that can result from a security breach. It then covers the most common threats that employees are likely to encounter in the workplace, including phishing emails, suspicious links and attachments, social engineering attempts, and the risks associated with weak passwords and shared credentials.

Practical advice is provided on maintaining security across all areas of work activity. This includes secure email practice, safe internet browsing, the appropriate use of USB drives and other removable media, and the importance of locking devices when unattended. The course covers the specific risks associated with mobile and remote working, including the use of public Wi-Fi and the security of devices outside the office environment.

The training also addresses the importance of reporting suspected security incidents promptly, explaining the potential consequences of delaying or failing to report. It covers the procedure for escalating concerns and the information that should be provided. Upon completion, learners will understand the cyber threats they face at work and be able to apply security best practices consistently in their daily activities.

Learning Outcomes

  • Understand the current cyber threat landscape and emerging risks
  • Identify common types of cyber attacks including phishing, malware, and social engineering
  • Recognise the importance of password security and multi-factor authentication
  • Know how to handle sensitive data securely
  • Understand the principles of data protection in a cyber context
  • Know how to respond to a suspected cyber security breach
  • Apply best practices for safe use of email, internet, and mobile devices
  • Understand the regulatory obligations around cyber security and data breach reporting