Cyber Security in the Workplace


Cyber Security in the Workplace is our flagship employee training course! This presentation arms your employees with the knowledge and understanding which they need to help keep your organization secure from cyber attacks and security breaches. It includes an overview of the current threat landscape and the reasons why organizations are targeted, common tactics used by attackers, and practical steps which they can take in their day to day activities to steer clear of cyber threats and minimize risk. The presentation involves the audience in a fun “Spot the Phish” contest in which real, modern examples of phishing emails are dissected. Course content is improved regularly.

Presentation Formats

  • Standard Form – 120 minutes
    • Available online and onsite (currently only online)
    • Includes short break and Question/Answer session
  • Abridged Form – 90 minutes
    • Available online and onsite (currently only online)
    • Includes shortened Question/Answer session

Presentation Outline

  1. What is cyber security?
    • We begin by discussing what exactly we mean by cyber security, and gain an understanding of its three main components.
  2. Who are the attackers, and what do they want?
    • Next, we survey the threat landscape. What are the five main categories of attacker, and what motivates each of them to do what they do? Why would we be a target?
  3. What’s the damage… bottom line?
    • Here, we delve into the real-world consequences of security breaches. How can they impact organizations such as ours, in practical terms?
  4. How do they usually get in?
    • We know who the attackers are, what they are after, and how they can cause trouble for us. But how do they get into our systems? We will examine the most common tactics used by hackers, and the top three ways in which they compromise their targets’ security.
  5. What can you do about it?
    • And now, on to the most important part – What can you do to help protect yourself and your organization? Fortunately, there are practical, effective steps to help stay secure, which we examine across four main areas:
      1. Password Security
        • Including the multi-pronged threat of Credential Compromise, how to craft passwords which are actually difficult for hackers to crack, multi-factor authentication, and ways to keep passwords secure.
      2. Email Security
        • This is the longest section, and includes an in-depth discussion about phishing – How phishing emails work, an introduction to social engineering, and how you can tell if an email is legitimate or malicious.
        • “Spot the Phish” exercise – The audience is engaged in examining over 25 real, modern examples of phishing emails, to become savvy at spotting these scams!
      3. Web Browsing Security
        • Including tips for safe browsing, countering online threats, and using public Wi-Fi.
      4. Computer and Mobile Device Security
        • What can we do to keep our computers and mobile devices as secure as possible? We explore the significance of software updates, antivirus programs, encryption, and physical security, among other topics, and take a look at some of the specific concerns surrounding cellphones.