Protecting Information (Digital Risks)

eLearning Course to Refresh your Understanding of Securing Digital Risks

Key Learning Points:

  • How to connect securely to a network while working remotely
  • What are the risks of connecting work devices to an unsecured network
  • How to transfer files securely to the network
  • How to send sensitive documents and files securely
  • What are secure ways of sharing sensitive information

Course Overview

An engaging online training course on Protecting Information designed to raise awareness on mitigating the risks and protecting information at work. In this interactive microlearning course, learners will understand how to prevent breaches in information security.

Presented in a gamified format to understand the key steps learners must take to keep information digitally secure. Learn the best practice to follow when connecting to a network at work, saving files and transferring data and recognise the risks to data security.

By raising awareness, learners will be empowered to make correct decisions and understand the significance of keeping information secure – decreasing the risks of information breaches.

Course Details

  • Engaging gamified format
  • Final assessment to pass the course
  • Certificate on completion
  • Course can be tailored using Adapt Authoring Tool
  • Course can be tailored to meet your specific requirements

Course Contents

This course is published by Cylix

Tailored versions of the courses are available for the following sectors

Compatible for

Any Workplace

Public Sector

University/HE

College/FE

School

Fire & Rescue

The Assessment

Learners must use their knowledge and understanding of information security to keep information digitally secure. Learn how to make the right decisions to securely connect to the network, transfer work to the shared drive and send sensitive documents to a client. Learners should aim to take as many correct decisions as possible to keep the risks low. Learners can also take the assessment again to improve their score.

2 Ways of Purchasing

You can purchase our courses individually or for even better value you can purchase the complete range of Compliance, Health and Safety or Performance Management courses in one neat bundle.

1. Individual Licenses

If you buy courses on an individual bases you pay a price per learner, per course per year. You can run these courses on your own LMS if Xapi/SCORM compliant or you can take them online.

Recommended

2. Complete Bundle

Buy all of the Compliance, Health and Safety or Performance Training courses in one great value package and receive unlimited benefits including our AI driven Learning Experience Platform, Astute.

1. Individual Pricing

Number of Learners Cost (per year)
1 - 10
£34.50 / per learner
11 - 20
£29 / per learner
21 - 50
£23 / per learner
51 - 100
£17.50 / per learner
101 - 150
£11.50 / per learner
150+
Exchange rates are updated regularly but are only intended as a guide.

2. Complete Bundle Pricing

If you buy all the Compliance, Health & Safety or Performance Training in a complete bundle, all features come as standard, no matter the size of your organisation!
Number of Learners Cost (per year)
50 - 100
£34.50 / per learner
101 - 200
£29 / per learner
201 - 300
£24.50 / per learner
301 - 400
£21 / per learner
401 - 500
£17.50 / per learner
501 - 750
£14.50 / per learner
751 - 1000
£11.50 / per learner
1001 - 2500
£9.50 / per learner
2501 - 5000
£7 / per learner
5000 - 10,000
£6 / per learner
10,000 +

Included Features

  • All courses in our catalogue
  • Our Learning Experience Platform ‘Astute’
  • New courses added regularly
  • Branded, downloadable posters
  • Customise Course Content for Your Team
  • Regular course updates
  • Dedicated Account Manager
  • Unlimited help desk support
Exchange rates are updated regularly but are only intended as a guide. Prices are based on a 2 year contract.

The Importance of Information and Cyber Security Training:

Information Security, or InfoSec as it’s also known, is becoming an increasingly pertinent subject with new breaches being reported in the news all time. It is, therefore, more important than ever to follow best practices of keeping information safe from unauthorised access at work. Digital risks connected to our work computers and storage devices can all pose a risk to information security. Raising awareness is key to keeping information safe and secure, preventing breaches and protecting organisational reputation.

FAQ's

If you have any questions that are not covered here, please get in touch.

An information security breach occurs when security measures are challenged by unauthorised access to reach protected areas of business systems. A security breach can give cybercriminals access to valuable information, such as confidential financial information, intellectual property, the personal data of customers including names, addresses, Social Security numbers, and credit card information.

Computer systems in the workplace are all linked via a network. If one computer is infected, the malware can quickly spread to other computers and devices in the organisation, compromising day to day operations. The key to mitigating the risks are consistency and following companywide best practice while accessing and transferring information.

Information security should be priority for all businesses because the consequences from breaches can be catastrophic. Breaches can also result in non-compliance with data protection regulations. Any kind of breach can impact businesses negatively through large penalty fines and loss of reputation – both vital factors for longevity and profitability a business.

If you have any feedback about our products please contact us at [email protected]

7 Day Instant FREE Trial