Cybersecurity and Online Habits (UK)
- 11 topics | 48m
- Up to 30 languages
- Transcripts
Sound cybersecurity practices are essential for preventing data breaches and other security incidents that can have devastating consequences for organisations. Employees, through the careful adherence to their company’s IT policies, form an important line of defence against cyberattacks. This course focuses on common pitfalls in IT security by end users and provides employees with common sense guidelines for managing cybersecurity risks. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for information purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create – and receipt does not constitute – an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.
WHAT YOU WILL LEARN
-
follow best practices to avoid falling victim to phishing attacks
-
identify techniques to reduce risks when downloading software
-
identify best practices for using online security features
-
identify best practices for creating and managing passwords
-
identify safe email practices
-
identify best practices for safe social networking in a professional context
-
recognise best practices for communicating through IM and text messaging
-
identify safe practices for using virtual meeting applications
-
identify actions you can take to avoid blogging-related risks
-
identify best practices for safe Internet use at work
-
identify characteristics of VPNs
IN THIS COURSE
-
Avoiding Phishing Attacks5m
-
Smart Downloading5m
-
Using Online Security Features5m
-
Proper Password Management6m
-
Proper Use of Email3m
-
Professional Social Networking4m
-
Using IM and Text Messaging3m
-
The Virtual Meeting – Doing It Right4m
-
Blogging2m
-
Proper Use of the Internet at Work3m
-
Using a Virtual Private Network (VPN)2m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
Global Business Ethics
COMPLIANCE-COURSE
Privacy Concerns (UK)
COMPLIANCE-COURSE
GDPR Short: Profiling and Data Enrichment