Keeping Information Secure

Train employees on keeping business information secure and keeping your business protected from information security breaches

Key Learning Points:

  • How to identify and minimise information security risks
  • What to do to ensure that systems are protected
  • Remain secure when out of the office or working externally
  • How to handle sensitive documents
  • Causes of data breaches
  • Individual responsibilities and legal requirements
  • How to assess physical security risks
Keeping Information Secure
Keeping Information Secure
Keeping Information Secure
Keeping Information Secure
Keeping Information Secure
Keeping Information Secure
Keeping Information Secure
CPD Points

Course Overview

This course is set in our engaging format and split into two modules of gamified scenarios.

It is designed to enable learners to understand key elements of data protection and keeping business information secure.

The course will also demonstrate to employees how to identify information security risks and minimise them accordingly. Learners are immersed in realistic scenarios which could occur in any organisation, anywhere in the world. The learner is tasked with discovering the source of a breach of information security.

Course Details

  • Course duration: 45 minutes
  • Available in 19 Languages

    Arabic Arabic Brazilian Portugese Chinese (Simplified) Chinese (Simplified) English English Estonian Estonian French French German German Hungarian Hungarian Indonesian Indonesian Japanese Japanese Korean Korean Polish Polish Romanian Romanian Russian Russian Spanish (Latin American) Spanish (Latin American) Spanish Spanish Swedish Swedish Thai Thai Turkish Turkish
  • CPD-certified
  • Certificate on completion
  • Course can be tailored using Adapt Authoring Tool
Download PDF

Who Should Take This Course?

Following best practice around information security is every employee's responsibility. This general awareness course on Keeping Information Secure for global organisations is recommended for all employees.

  • Full-time employees
  • Part-time employees
  • Administrators
  • Coordinators
  • Managers
  • Supervisors
  • Directors

The Assessment

Learners take on the mission to prevent video clips of Colombina from being leaked to the internet. Learners can do this by correctly answering questions about information security risks. For every correct answer, learners will see Colombina and they have saved a video. For a wrong answer, learners will see the Harlequin and it means that another video has been leaked.

There are a total of 20 videos at risk of being leaked – 13 videos in module 1 and 7 videos in module 2. To protect Pix Perfect studios and the Colombina movie, learners need to save 10 -13 clips in module 1 and 5 -7 clips in module 2.

2 Ways of Purchasing

You can purchase our courses individually or for even better value you can purchase the complete range of Compliance, Health and Safety or Performance Management courses in one neat bundle.

1. Individual Licenses

If you buy courses on an individual bases you pay a price per learner, per course per year. You can run these courses on your own LMS if Xapi/SCORM compliant or you can take them.

See Prices
Recommended

2. Complete Bundle

Buy all of the Compliance, Health and Safety or Performance Management courses in one great value package and receive unlimited benefits.

See Prices

1. Individual Pricing

Number of Learners Cost (per year)
1 - 10 29 / per learner
11 - 20 25 / per learner
21 - 50 20 / per learner
51 - 100 15 / per learner
101 - 150 10 / per learner
150+ POA

Exchange rates are updated regularly but are only intended as a guide.

2. Complete Bundle Pricing

If you buy all the Compliance, Health & Safety or Performance Management in a complete bundle, all features come as standard, no matter the size of your organisation!

Number of Learners Cost (per year)
1 - 100 30 / per learner
101 - 200 25 / per learner
201 - 300 21 / per learner
301 - 400 18 / per learner
401 - 500 15 / per learner
501 - 750 12.50 / per learner
751 - 1000 10 / per learner
1001 - 2500 8 / per learner
2501 - 5000 6 / per learner
5000 - 10,000 5 / per learner
10,000 + POA
Included Features
  • All courses in our catalogue
  • New courses added regularly
  • Branded, downloadable posters
  • Customise Course Content for Your Team
  • Astute eLearning Platform
  • Regular course updates
  • Dedicated Account Manager
  • Unlimited help desk support

Exchange rates are updated regularly but are only intended as a guide. Prices are based on a 2 year contract.

Get a Quote

The Importance of Information & Cyber Security Training

With the frequency of cyber security breaches increasing at an alarming rate, never has information security been so important for organisations across the globe. It is therefore more important than ever to follow best practices of keeping information safe from unauthorised access – whether it's stored electronically or physically. Computers, mobile phones and tablets can all pose a risk to information security. Keeping information safe and secure is critical when it comes to an organisations' reputation and standing.

Identifying and minimising security risks is becoming increasingly important and this course demonstrates ways in which to do this.

The Importance of Information & Cyber Security Training

FAQ's

If you have any questions that are not covered here, please get in touch.

Get in Touch
What are some types of security breaches?
Cybercriminals can use phishing to target businesses, using viruses and other malware to break into business systems and applications. Cybercriminals can also initiate ransomware attacks and demand a financial payment in exchange for restoring access. Other breaches can occur from within the business when employees inadvertently create an access point for unauthorised access to business information either digitally or onsite.
Who benefits from information security breaches?
Business information can be targeted internally or externally. External threat includes cybercriminals and hackers who target confidential information such as names, email addresses and other confidential financial information. Personal identifiable information is sold on the dark web and can be used to commit further crimes such as identity theft. While internal threats include employees seeking to enable unauthorised access or steal information for a financial gain.
How to mitigate the risks to information security?
A threat to information security is often any unauthorised access to business information. Information security threats can cause serious damage and leave businesses vulnerable to cybercriminals by making it easier for them to infiltrate their systems and networks. Businesses can mitigate the risks by raising awareness and training employees on information security best practices.

7 Day Instant FREE Trial

Try a Demo