Offline security

Module 11: Offline security

This penultimate module explores the simple changes you can make to keep information secure when you’re on the move.

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Portable devices and apps

Module 10: Portable devices and apps


This module explains how to use portable devices and apps securely and safely.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page


Email accounts

Module 9: Email accounts

This module explains how to use your email account correctly to ensure good cyber security practice.

Note

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Online services and file sharing

Module 8: Online services and file sharing

This module looks at the most secure way to save and share documents in the cloud.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Internet security

Module 7: Internet Security

This module explores the implications of using public Wi-Fi and some top tips on how to do it securely.

Note

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Social media

Module 6: Social media


This module explores how using social media might leave both you and your colleagues vulnerable to spear phishing – and what steps you can take to make your personal social media accounts resilient to cyber-attack.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Scams

Module 5: Scams

This module explores the differences between phishing and spear phishing attacks, as well as exploring telephone scams and what you should do if you think you are being scammed.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Passwords

Module 4: Passwords

This module explores the pitfalls of using weak passwords and what good password practice really means. It also explains the dos and don’ts of password security and suggests simple and practical ways to make passwords more resilient to cyber-attack.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


Handling personal data

Module 3: Handling personal data

This module explores the changes you need to have in place, in order to comply with the tighter rules and increased penalties of GDPR.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.


What is personal data

Module 2: What is personal data?

This module explores what Personal Data is, and some of the key implications of GDPR.

Note:

  • You may need to scroll down to view all the content in the launched content. At the end, the content requires you to select the x in the bottom right-hand section of the window.
  • Click on the button below to launch the eLearning content.

Click To Launch Learning Content
The previous module and next module buttons below will only become active once your have engaged with the eLearning content on the page.