Protecting Information (Physical Risks)

Identify physical information security risks to keep your organisation secure

Key Learning Points:

  • How to keep hard-copy information secure
  • How to raise awareness on the use of confidential or personal files
  • How to protect information when away from your desk
  • Securing mobile devices, such as laptops, tablets, and mobile phones
  • Importance of locking away or encrypting portable storage devices
  • Importance of shredding confidential documents
Protecting Information (Physical Risks)
Protecting Information (Physical Risks)
Protecting Information (Physical Risks)
Protecting Information (Physical Risks)
Protecting Information (Physical Risks)
Protecting Information (Physical Risks)

Course Overview

Previously titled 'Is Your Information Secure?'.

This course is set in our Take 5 microlearning format and contains a single module.

The interactive course starts with a tour of a typical office, its filing systems, printing station and workstations. Learners must take a closer look to correctly spot the lapses in information security and recognise the potential risks.

Along the way, learners will understand the importance of information security in the workplace and how they can contribute to securing business information and assets.

Course Details

  • Course duration: 5 minutes
  • Available for translation

    Cost effective solutions exist for 70+ languages.
  • Online microlearning course
  • Engaging learning experience through gamification
  • Certificate on completion
  • Can be tailored using Adapt Authoring Tool
  • Course can be tailored to meet your specific requirements
Download PDF

The Assessment

Learners begin the challenge with a tour of a typical office, followed by a quiz to test user knowledge and see if potential risks were accurately identified. During this challenge you'll collect security shields for correctly identifying each physical information security risk in the virtual workplace. Collect all of the security shields to make your physical information secure. On successful completion of the course, learners will be able to download a certificate of achievement.

2 Ways of Purchasing

You can purchase our courses individually or for even better value you can purchase the complete range of Compliance, Health and Safety or Performance Management courses in one neat bundle.

1. Individual Licenses

If you buy courses on an individual bases you pay a price per learner, per course per year. You can run these courses on your own LMS if Xapi/SCORM compliant or you can take them.

See Prices

2. Complete Bundle

Buy all of the Compliance, Health and Safety or Performance Training courses in one great value package and receive unlimited benefits.

See Prices

1. Individual Pricing

Number of Learners Cost (per year)
1 - 10 29 / per learner
11 - 20 25 / per learner
21 - 50 20 / per learner
51 - 100 15 / per learner
101 - 150 10 / per learner
150+ POA

Exchange rates are updated regularly but are only intended as a guide.

2. Complete Bundle Pricing

If you buy all the Compliance, Health & Safety or Performance Training in a complete bundle, all features come as standard, no matter the size of your organisation!

Number of Learners Cost (per year)
50 - 100 30 / per learner
101 - 200 25 / per learner
201 - 300 21 / per learner
301 - 400 18 / per learner
401 - 500 15 / per learner
501 - 750 12.50 / per learner
751 - 1000 10 / per learner
1001 - 2500 8 / per learner
2501 - 5000 6 / per learner
5000 - 10,000 5 / per learner
10,000 + POA
Included Features
  • All courses in our catalogue
  • New courses added regularly
  • Branded, downloadable posters
  • Customise Course Content for Your Team
  • Astute eLearning Platform
  • Regular course updates
  • Dedicated Account Manager
  • Unlimited help desk support

Exchange rates are updated regularly but are only intended as a guide. Prices are based on a 2 year contract.

Get a Quote

Why You Need Training

37% of UK businesses experience information security attacks at least once a month. With online information hacking happening every 39 seconds on average, information security is increasingly one of the most crucial considerations all businesses must pay attention to.

By 2020, it's predicted that there will be approximately 200 billion Internet of Things (IoT) devices available around the home and workplace. These include more unconventional items like fridges and speakers which will all need varying level of security. The reality is that there has never been a more urgent time to protect yourself, your assets, and your organisation from potential information breaches.

Why You Need Training


If you have any questions that are not covered here, please get in touch.

Why is it important to keep information secure?
For businesses, information is an important asset that enables day-to-day operations. Implementing business-wide information security is essential for protecting technology and business information. By preventing, detecting and responding to security threats, both internal and external, businesses can safeguard their information assets, comply with regulations and ensure business continuity and growth.
Which information needs to be secured?
Both physical and digital information needs to be secured. Examples of physical information include business information stored away in filing systems and desks. While digital information is any information stored on devices including work computer, laptops, mobile phones, tablets, storage devices such as USBs. All of these business assets need to be secured to ensure that business information is safe from misuse in case they are lost or stolen.
How to keep information secure on a device?
Whether you are based in the office, travel for work or are home-based, you need to keep your devices safe from the threat of cyberattacks. Protecting your devices with up-to-date security software, you can reduce the likelihood of hackers gaining unauthorised access to your devices and network and keep your business and personal information secure.

7 Day Instant FREE Trial

Try a Demo