Using Portable Storage Devices Securely

Train employees on using portable storage devices securely to protect your organisation

Key Learning Points:

  • What are the different types of portable devices
  • Why are portable devices important for business
  • What are the consequences of not using portable data devices securely
  • What constitutes as a portable data storage
  • Which are the Do's and Don'ts of using portable storage devices for business purposes
Using Portable Storage Devices Securely
Using Portable Storage Devices Securely
Using Portable Storage Devices Securely
Using Portable Storage Devices Securely
Using Portable Storage Devices Securely
Using Portable Storage Devices Securely
CPD Points

Course Overview

This online training course on using portable storage devices securely demonstrates the risks facing organisations when using portable devices to store or share business information. The course is designed to raise awareness amongst employees and covers some helpful tips on the do's and don'ts of using portable storage devices. The course is developed keeping in mind industry guidance and ensures that businesses understand how to securely use portable data storage devices from the point of receiving the data to the point where it leaves their hands, to be either returned, destroyed or otherwise.

Course Details

  • Course duration: 5 minutes
  • Certificate on completion
  • Course can be tailored using Adapt Authoring Tool
Download PDF

Who Should Take This Course?

Following best practice around keeping portable devices secure is every employee's responsibility. This general awareness course on Using Portable Devices Securely is recommended for all employees.

  • Full-time employees
  • Part-time employees
  • Administrators
  • Coordinators
  • Managers
  • Supervisors
  • Directors

The Assessment

This microlearning course on using portable storage devices securely concludes with a quiz to test if learners are aware of using portable devices securely and protect their organisation from the risk of data breaches. To successfully complete the course, learners must aim to answer all questions correctly. Learners can also take the assessment again to improve their score.

2 Ways of Purchasing

You can purchase our courses individually or for even better value you can purchase the complete range of Compliance, Health and Safety or Performance Management courses in one neat bundle.

1. Individual Licenses

If you buy courses on an individual bases you pay a price per learner, per course per year. You can run these courses on your own LMS if Xapi/SCORM compliant or you can take them.

See Prices
Recommended

2. Complete Bundle

Buy all of the Compliance, Health and Safety or Performance Management courses in one great value package and receive unlimited benefits.

See Prices

1. Individual Pricing

Number of Learners Cost (per year)
1 - 10 29 / per learner
11 - 20 25 / per learner
21 - 50 20 / per learner
51 - 100 15 / per learner
101 - 150 10 / per learner
150+ POA

Exchange rates are updated regularly but are only intended as a guide.

2. Complete Bundle Pricing

If you buy all the Compliance, Health & Safety or Performance Management in a complete bundle, all features come as standard, no matter the size of your organisation!

Number of Learners Cost (per year)
1 - 100 30 / per learner
101 - 200 25 / per learner
201 - 300 21 / per learner
301 - 400 18 / per learner
401 - 500 15 / per learner
501 - 750 12.50 / per learner
751 - 1000 10 / per learner
1001 - 2500 8 / per learner
2501 - 5000 6 / per learner
5000 - 10,000 5 / per learner
10,000 + POA
Included Features
  • All courses in our catalogue
  • New courses added regularly
  • Branded, downloadable posters
  • Customise Course Content for Your Team
  • Astute eLearning Platform
  • Regular course updates
  • Dedicated Account Manager
  • Unlimited help desk support

Exchange rates are updated regularly but are only intended as a guide. Prices are based on a 2 year contract.

Get a Quote

Consequences of Improper Use

Do you know the consequences of not using portable storage devices securely?

Storing personal data and information on these devices can lead to serious data breaches if they are not kept safe, which could lead to official investigations, fines and substantial damage to your organisation's cyber security, information security and reputation.

Portable storage devices, mainly being USB's, flash drives and memory sticks, are a popular way for hackers to transmit viruses and malicious code while compromising your business' information. They're small, readily available, extremely portable and inexpensive, making them extremely appealing to attackers, and dangerous for you.

Consequences of Improper Use

FAQ's

If you have any questions that are not covered here, please get in touch.

Get in Touch
What are portable devices?
A portable device is capable of storing and transferring information and is designed to be easily carried. Portable devices include laptops, smart phones, tablets, external hard drives and USB flash drives. In business context, portable devices are capable of storing large amounts of business information and data and can be carried around for ease of use.
Why is it important to secure portable devices?
One of the biggest risks with portable devices is that they can be lost or stolen. It is important to secure portable devices against information security threats which could lead to data and security breaches, unauthorised access to confidential data, and even loss of data as a result of stolen or misplaced device.
Why are portable devices important for business?
Portable devices are designed to offer greater flexibility for business. Portable devices help make employees more efficient and productive through enhanced workflows and better communications. Portable devices also offer businesses a competitive edge, enabling faster decision making through improved collaboration and ease of access. Simply put, portable devices are vital for business continuity and growth.

7 Day Instant FREE Trial

Try a Demo