We're here to help
Module 12: We’re here to help!
This is the very last module of your Safety Dojo online course. It focuses on offering reassurances – your colleagues are here to give you guidance and advice on anything you’re not sure of.
And to remember, you are the last line of defence!
Note:
- This content will launch in a new tab in your browser – simply close the browser tab on completion of the elearning content to easily return to this course environment and access your eCertificate.
Offline security
Module 11: Offline security
This penultimate module explores the simple changes you can make to keep information secure when you’re on the move.
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.
Portable devices and apps
Module 10: Portable devices and apps
This module explains how to use portable devices and apps securely and safely.
Note:
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page
Email accounts
Module 9: Email accounts
This module explains how to use your email account correctly to ensure good cyber security practice.
Note
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.
Online services and file sharing
Module 8: Online services and file sharing
This module looks at the most secure way to save and share documents in the cloud.
Note:
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.
Internet security
Module 7: Internet Security
This module explores the implications of using public Wi-Fi and some top tips on how to do it securely.
Note
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.
Social media
Module 6: Social media
This module explores how using social media might leave both you and your colleagues vulnerable to spear phishing – and what steps you can take to make your personal social media accounts resilient to cyber-attack.
Note:
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.
Scams
Module 5: Scams
This module explores the differences between phishing and spear phishing attacks, as well as exploring telephone scams and what you should do if you think you are being scammed.
Note:
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.
Passwords
Module 4: Passwords
This module explores the pitfalls of using weak passwords and what good password practice really means. It also explains the dos and don’ts of password security and suggests simple and practical ways to make passwords more resilient to cyber-attack.
Note:
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.
Handling personal data
Module 3: Handling personal data
This module explores the changes you need to have in place, in order to comply with the tighter rules and increased penalties of GDPR.
Note:
- You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
- Click on the button below to launch the eLearning content.
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.