We're here to help

Module 12: We’re here to help!

This is the very last module of your Safety Dojo online course. It focuses on offering reassurances – your colleagues are here to give you guidance and advice on anything you’re not sure of.
And to remember, you are the last line of defence!

Note:

  • This content will launch in a new tab in your browser – simply close the browser tab on completion of the elearning content to easily return to this course environment and access your eCertificate.

Click To Launch Learning Content


Offline security

Module 11: Offline security

This penultimate module explores the simple changes you can make to keep information secure when you’re on the move.

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Portable devices and apps

Module 10: Portable devices and apps


This module explains how to use portable devices and apps securely and safely.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page


Email accounts

Module 9: Email accounts

This module explains how to use your email account correctly to ensure good cyber security practice.

Note

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Online services and file sharing

Module 8: Online services and file sharing

This module looks at the most secure way to save and share documents in the cloud.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Internet security

Module 7: Internet Security

This module explores the implications of using public Wi-Fi and some top tips on how to do it securely.

Note

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Social media

Module 6: Social media


This module explores how using social media might leave both you and your colleagues vulnerable to spear phishing – and what steps you can take to make your personal social media accounts resilient to cyber-attack.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Scams

Module 5: Scams

This module explores the differences between phishing and spear phishing attacks, as well as exploring telephone scams and what you should do if you think you are being scammed.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Passwords

Module 4: Passwords

This module explores the pitfalls of using weak passwords and what good password practice really means. It also explains the dos and don’ts of password security and suggests simple and practical ways to make passwords more resilient to cyber-attack.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Handling personal data

Module 3: Handling personal data

This module explores the changes you need to have in place, in order to comply with the tighter rules and increased penalties of GDPR.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.