We Detect, Then Protect
0333 323 3981
Our latest development, mitigate, is certified by the UK Government’s Communications Headquarters, GCHQ, and incorporates easy-to-follow scenario-based e-learning modules.
It is the most cost-effective way to provide as many employees, in a quick and consistent environment, to gain the skills and confidence to achieve “Cyber Trusted Status”.
The mitigate process is designed to reduce internal risks through four simple steps:
The learner is immersed in a realistic or situational simulation that is inspired by real-life incidents and is asked to follow a storyline, attempt certain tasks and gather skills and knowledge that they will recall for future use.
Twelve bite-size sections, in four simple bundles:
Online Security Training Bundle
Providing the learner with basic tools to ensure all internet usage is safe, knowing how to keep email communications secure and be alerted of the potential risks and share little-known techniques to create truly protected passwords for your various devices and accounts.
Remote Security Training Bundle
Providing the learner with the risks associated with remote devices, in terms of personal equipment, company-provided equipment and how they both interact with any public Wifi network or other networks that could host potential vulnerabilities for the user.
Information Security Training Bundle
Providing the learner with the intermediate skills to manage data and information, through a knowledge of the various level of classification of data, and the respective levels of risk and responsibility surrounding them, as well as how to encrypt and back up data, to mitigate against attacks or human error.
Workstation Security Training Bundle
Providing the learner with the advanced skills to spot potential physical vulnerabilities in their own cyber security at work, understanding what and how to destroy and dispose of in terms of confidential information and to create a vigilance of the threat of attack through social engineering.
mitigate provides an easy-to-use back-end system which records the progress of each learner, awards successful completion and motivates learners. Motivation is crucial to effective learning and skill building, and the system provides more motivation for policy sign-offs than simply by their mandatory nature.
At the same time, the same back-end system offers administrators the opportunity to get a high-level view of employee progress with respect to completed awareness training, policy sign-offs and adoption, hence putting the company in a more actiove and 'in-control' role in the effort of reinforcing the security posture and culture of the organisation through successful use of policies.
Our strategy for implementing cyber awareness with our training course certified by GCHQ, is 'tone from the top, message from the middle'. This means to set the scene within the upper ranks of management, allowing them to use their depar...
Awareness training will help you to gain some valuable insight for how to recognise cyber threats and how to proactively protect your business with a series of housekeeping tips to use in the workplace.
To familiarise all members of the workforce with the legal implications with handling, sharing and storing data. The course will demonstrate the regulations that businesses must follow to ensure they are working in line with, and are not at risk of...
Working away from the office can present further business risks due to the insecurity of the external environment. Our training will provide insight into how to remain protected whilst accessing important data remotely.
Social engineering is defined by the phrase ‘manipulation for information’ and relates to the art of gaining physical access to, or information about the business for personal gain. Businesses face the threat of social engineering daily t...