Security Awareness Training

Fully Managed Cyber Security Awareness Training & Testing (SATT)

SATT Customer Resources

A4 Leaflets. A2 Posters. Infographics.

E-mail Security: E-mail attacks are one of the most common ways for criminals to gain access to your sensitive information or breach your company network, and in some cases, demand a ransom. These types of attacks are commonly known as Phishing, Spear Phishing, Ransomware and CEO Fraud. Phishing E-mails appear in different forms but will all contain at least one Hook. Use BAIT to assess the threat and take the appropriate action.

Website Security: Criminals use the Web to gain access to your sensitive information, access organisation networks and install Malware, Ransomware of other harmful software. Typical methods include Pop-ups, Toolbars and Phishing Websites. These types of attack all contain HOOKS which you can spot to keep yourself safe on the Web.

Physical Security: Physical Security is the threat of unauthorised access to information and data via a human interaction, whether this be an interaction made directly with you, a colleague or your environment. Security incidents can be caused through physical means. Knowledge of best practices will help you to protect yourself and your organisation.

Click Here to Download pdfs and print files >>

Mobile and WiFi: Using mobile devices and public Wi-Fi can make you vulnerable to cyber attacks. Criminals attack mobile devices and use them as a gateway to sensitive information held by yourself or your organisation, or to launch a Spear Phishing, Ransomware or CEO Fraud attack. Most mobile devices can connect to the internet. The focus is on smart phones and tablets as these are the most common devices used in the workplace. Public Wi-Fi is any Wi-Fi network which is not provided by your organisation. All Wi-Fi, including your home network, should be password protected.

Handling Sensitive Information: Sensitive Information, if lost or stolen, could compromise your personal security and the security of your organisation. In a business sense, this could be company figures, plans, customer lists or payslips. For you personally, this could be your account passwords, bank statements, or ID such as your passport or driving licence. Information found in documents like this can be exploited by criminals or can be used to form another type of attack, for example a Social Engineering call or targeted Spear Phishing attack. It is important to know how to handle Sensitive Information safely.

  • Remote Office Data Protection

    Remote & branch offices are particularly vulnerable to data loss - read more...
  • Protection from advanced threats

    6 recommendations from Blue Coat - read more...
  • Tokenless Strong Authentication

    Use the device you carry as the authenticator - read more...
  • Email security specifically for SMEs

    Proofpoint Essentials offers ultimate email protection - read more...
  • Enquiry LinkedIn Spiceworks