Cyber Security Awareness Training

Cyber Security Awareness Training

Bridging the gap between IT and end users

All Products > Cyber Security Awareness Training

For the past 10 years, we have successfully changed the attitudes of hundreds of thousands of users, using our engaging and cost-effective awareness training.

We provide a fresh, modern take on cyber security training and compliance. There are no complicated textbooks or unnecessary technical explanations - our narrative-based approach is designed to create memorable scenarios that you and your colleagues can relate to and learn from.

Our cyber security awareness training is not only fun and cost-effective, but it is time-sensitive too - our mobile modules take just 10-15 minutes to complete, and our customisable training is easy to implement and manage.

The illustrative animation style has proven to create natural long-term behavioural change for our clients as they simulate reality in work-related scenarios, making them more relatable to everyone.

Product Benefits

  • Employees will be able to detect and mitigate security risks effectively
  • Managed service ensures minimal input is required from a client perspective
  • Compliance with industry standards is made easy with modular content, written in line with best practise guidance outlined in industry standards
  • Advanced and automated reporting features allow you to track completion for compliance reporting purposes
  • Modular approach ensures that learners can complete the modules at their own pace

Here’s what our clients had to say

“Bob has proved a great hit with staff. Users appreciate the level-headed content of the security message and digestible size of learning modules whilst Management regard Bob as a highly cost-effective tool.”
Sharon Buck, Business Continuity Manager, Liberata.

Related Products

Think Before You Click

Measuring and reducing your organisation’s susceptibility to phishing. To find out more click here.

Modules in this package

Perfect Passwords

This module encourages security awareness and the protection of your organisations information, with the ultimate aim of reducing information loss, damage or leakage.  Passwords are critical to your organisation as they help to prevent security breaches and restrict access to your systems and vital information.

A good password is one that’s hard to guess, yet easy to remember. This module will ensure all staff gain a greater understanding of the importance of creating and maintaining secure passwords, but also provides guidance on how to create a secure yet memorable password.

This module covers…

  • Why passwords are crucial to maintaining a secure business
  • Guidance on how to construct a secure password
  • Best practice advice on when to change passwords
  • The importance of keeping passwords private
PCI DSS

The PCI DSS module is applicable to your organisation if you accept credit/debit card payments or process cardholder information.  It is a legal requirement that your organisation implements a formal security awareness program ensuring all your employees who handle card details are aware of the importance of data security.

The Payment Card Industry Data Security Standard (PCI DSS) contains a set of comprehensive requirements for maintaining payment account data.  There are 12 requirements in total; this module outlines those applicable to members of staff who process card holder data.

This module covers…

  • Introduction to PCI DSS
  • Overview of the 12 requirements of the Standard
  • Which data elements must be protected
  • Processing of information with or without the cardholder present
  • Individual responsibilities with regards to the protection of card holder data
Identity theft

Identity theft is an increasingly common crime affecting both individuals and companies. Criminals are working harder to get information they can use to steal identities for the purposes of theft or making false loan and credit applications.

This module contains information on how to better protect your business identity and personal identity, the dangers of incorrectly disposing of information and the true value of information which helps to identify you to criminal minds.

This module covers…

  • Introduction to Identity Theft
  • Practises that will help prevent Identity Theft
  • Business practises that put companies at risk
  • How to safely dispose of sensitive data
Carefully Classified

This module is applicable to your organisation if you believe information is a key organisational asset and protecting it is a shared responsibility. Information Classification defines a set of protection levels and special handling measures for information which is valuable, sensitive or critical to your organisation.

Information Classification assigns an owner to each piece of information. This module introduces Information Classification and outlines the responsibilities of an asset owner with regards to classifying, sharing, storing and disposing of information.

This module covers…

  • Why Information Classification is important for overall security
  • How information is classified
  • What protective markings are and how they should be applied
  • Guidance on how to store restricted information securely
  • Individual responsibilities regarding the disposal of information
Backing up Data

This module is applicable to any and all organisations that use electronic systems. The process of backing up data has been long seen as a vital security measure as backups can be used to repair any information loss ranging from viruses to accidental fire. Backing up data is a vital security measure that ensures an organisation can repair information loss resulting from anything from a fire to a virus attack.

This module explains why backing up information is critical and provides best practice advice on how to back up data to ensure information recovery is possible and business disruption is minimal.

This module covers…

  • The dangers of failing to back up information
  • Best practice regarding the storage of backups
  • The types of information which should be backed up
  • The frequency of backing up information
Phishing Fears

This module is applicable to all users of electronic mail. Phishing is the practise of sending out false emails, generally posing as a bank or similar organisation, to a wide audience with the hope that some of them will reply and divulge their account details.

Phishing attacks can lead to financial loss or loss of business critical information and can affect a company’s reputation. This module introduces Phishing and demonstrates how easy it is to be fooled into divulging information which can then be used to obtain personal or company information.

This module covers…

  • How a Phishing scam works
  • The repercussions of a Phishing attack
  • How to avoid becoming a victim
Mobile working

This module is applicable to your organisation if your employees work in multiple locations and use mobile devices such as laptops, mobile phones and data sticks. If your organisation is committed to remote working for business purposes, you must ensure that suitable controls are in place to prevent loss of or interference with critical business information. 

This module contains identifiable scenarios which highlight the danger and risks associated with working in locations that are not protected by your internal network and guidance on how to protect your physical devices and the information they contain.

This module covers…

  • The risks associated with using mobile devices in unprotected environments
  • Methods for safe guarding information when working remotely
  • Guidance on the safe storage of mobile devices
  • Individual responsibilities with regards to the protection and use of mobile equipment
Web Woes

This module is applicable to your organisation if you allow your employees to access information over the internet. The internet is an extremely valuable resource and access to online information is critical for most businesses. Therefore it is important that all your employees are aware of online threats and the danger these pose for your organisation.

This module contains a range of tips that will help your organisation and its employees stay safe online.

This module covers…

  • How to use the internet safely
  • Identifying and avoiding online threats
  • Accessing secure websites
  • Advice when completing online forms
Email Etiquette

This module is applicable to your organisation if you use email as a form of communication. The legal standing of an email is the same as a letter on company stationery so being careful with what is sent and how it is sent is important, both to protect your reputation and avoid legal issues.

This module contains information regarding how using emails incorrectly can cause problems, not just for the organisation but also for its employees, clients and suppliers, and how sending mass emails can be perceived as spam.

This module covers…

  • Best practice when writing emails
  • A definition of SPAM and its consequences
  • Legal disclaimers
Protected Premises

This module is applicable to your organisation if you believe protecting business critical information is a shared responsibility. The protection of your business premises is crucial as all the confidential information that is owned by your organisation is either stored or can be accessed from your premises.

This module highlights how simple it is for unauthorised individuals to enter business premises and access confidential information. This module also introduces people-based controls and personal measures that can be undertaken to prevent unauthorised access and information being compromised.

This module covers…

  • Methods of keeping your business premises safe
  • Potential threats and ways of countering them
  • What people-based controls are
  • Dealing with unfamiliar faces in a non-public place
Virus Vigilance

This module will benefit any member of staff who comes into contact with the internet or an e-mail system. A virus is a program which enters your network or computer without your consent with the intention of damaging the network or taking confidential information. In many cases a virus will replicate and spread across the network resulting in a loss of resources and time.

This module contains the information your employees need to help them identify potential viruses and prevent them accidentally downloading software which could be damaging to your organisation.

This module covers…

  • Applications which are susceptible to viruses
  • How to handle emails you suspect to have a virus
  • How to identify that your system has a virus
  • Maintaining virus protection
Advanced Fee Frauds

This is a threat that thrives on individuals’ emotions and greed and is therefore a potential risk to all employees within any organisation. An advance-fee fraud scam tricks victims into paying money up front on the false hope of receiving a large windfall later.

The approach can be made by letter, fax, email or telephone and invariably these appear to come from high ranking government or bank officials. This module introduces Advance Fee Frauds and explains how they work and what to look out for.

This module covers…

  • An introduction to Advanced Fee Frauds scams
  • How to avoid becoming a victim
  • The potential consequences of being a victim
  • Where to go for help if you become a victim
Keeping it clear

This module is applicable to your organisation if you want to encourage staff to become more security aware in relation to your organisational information and ultimately prevent information loss, damage or leakage.

Maintaining a clear desk policy reduces the risk of critical business and information disclosures and personal information being stolen or incorrectly thrown away. This module introduces the principles behind keeping desks clear and best practices for storing information.

This module covers…

  • Adopting a clear desk policy
  • Best practice advice on how to store information
  • The consequences of not keeping a clear desk
  • The importance of locking your computer screen
CCTV

A cornerstone of Information Security is establishing a clear system for the handling of any personal information. Believe it or not, a system for the handling of images relating to individuals is no different. It is important to establish who has responsibility for the control of the images, for example, deciding what is to be recorded, how the images should be used and to whom they may be disclosed.

This module covers…

  • Your responsibilities regarding the release of CCTV footage
  • How to handle Surveillance footage securely
  • How to judge whether or not to disclose the footage
Secure Printing

Printing and faxing is often overlooked as a security risk as it isn’t immediately obvious as to the possible dangers, however they can result in confidential or classified information being seen or taken by the wrong people and that could be devastating to your organisation’s standing.

This module covers…

  • The dangers of printing classified information
  • Best practice regarding documents
  • Safe usage of the fax machine
  • Ensuring your confidential documents safety
ISO 27001

Information Security is just as important to your organisation as it is to you, and that’s why thousands of companies across the country are implementing an Information Security Management System (ISMS). ISO 27001 is a recognised standard for implementing an ISMS, and it’s very important to your staff to follow it.

This module covers…

  • What is ISO/IEC 27001?
  • How does it protect my company?
  • What is meant by Confidentiality, Availability and Integrity?
Anti Bribery

Does everybody really know a bribe when they see one? Would you think giving money to speed up a business process is a bribe? Bribery is a difficult problem to contain because it is sometimes hard to see the true nature. This module will help your staff differentiate between a bribe and a good natured act.

This module covers…

  • Innocent gestures that can be perceived as bribery
  • Consequences of accepting a bribe
  • Dangers of offering gifts and incentives
  • Responsibilities for preventing bribery
ISO 14001

If you want to lower your carbon emissions, you’re going to need to change a few things. Many organisations don’t implement strategy for actually doing so. Enter ISO 14001; a standard for implementing measures to manage an organisation’s resources effectively to help the environment. All it takes is that first step for you and your staff towards working to being that little bit greener.

This module covers…

  • The importance of an Environmental Management System
  • The requirements to lowering your carbon footprint
  • What you can do to lower Co2 emissions in your office
Health & Safety

A good workplace isn’t complete without health & safety. Every day countless people are injured at work and have to take time out to recover. Many people are unaware of the precautions and procedures that need to be taken in order to protect themselves and their colleagues from harm. Educate your workforce on how to keep the workplace safe with the health & safety module!

This module covers…

  • The importance of risk assessments
  • How injury at work can affect the business
  • Who is responsible for health & safety?
  • What can happen if health & safety isn't controlled
Data Protection

If your organisation handles personal information, you have a number of legal obligations to protect that information under the Data Protection Act 1998. Data Protection Act training is an important part of any organisation’s strategy as it affects customers, employees, stakeholders and partners who all need to know that their information is safe with your organisation.

This module contains an outline of the Data Protection Act 1998. The purpose of the Data Protection Act is to provide regulations for the capture, processing, maintaining and retention of data relating to individuals.

This module covers…

  • Introduction to the Data Protection Act 1998
  • What a Subject Access Request is and how it should be dealt with
  • The 8 principles of Data Protection
  • Who is responsible for the protection of data
  • Why Data Protection is important
Freedom of Information

This module is applicable to your organisation if you operate within the public sector.  The Freedom of Information Act 2000 covers the entirety of the public sector and gives individuals the right to request information held by public authorities.

This module contains an introduction to both the Freedom of Information Act 2000 (FOI) and the Environmental Information Regulations 2005 (EIR). The purpose of both these Acts is to encourage openness and transparency between public sector organisations and the general public.

This module covers…

  • The importance of FOI and EIR
  • What constitutes a FOI or EIR request
  • The types of information covered by these Acts
  • How to act upon a request for information
  • What information can and cannot be requested
  • The implications a breach of the Act will have from a legal perspective and on your business reputation
Business Continuity

This module is applicable to your organisation if you need your employees to have an understanding of Business Continuity Planning and the role they play in creating and executing a plan. A Business Continuity Plan is a roadmap for continuing operations under adverse condition including natural or man-made incidents.

Information is a key organisational asset and loss of information can lead to loss of business, productivity, reputation and public trust. This module contains an overview of Business Continuity Planning and guidance on how to plan for the unexpected, preventing the loss of critical information and services.

This module covers…

  • An introduction to Business Continuity
  • The benefits of Business Continuity Planning
  • Why Business Continuity Planning is important
  • Who should be responsible for business continuity planning
Social Media

Right now, social media is integral to how modern businesses are run. It can be an invaluable tool if used in the right way. However, as helpful as it can be, it can also be just rather damaging if not used right. In Bob’s Social Media Module, you can make sure there are no slip-ups online with your Social Media Use!

This module covers…

  • Know what is acceptable and what isn’t when using Social Media.
  • How to effectively use Social Media to your benefit.
  • How Social Media could cause damage to your business.
Risk Management

If you want to be rich, powerful or successful, you’re going to have to take a few risks. But that doesn’t mean you should mortgage your house, withdraw your bank balance and head to the nearest casino… you see, success is defined by how we manage risks – i.e. how we weigh up possible benefits against possible setbacks to make smarter decisions.

And at work, you’re presented with ‘risk’ decisions every day – decisions that could result in landing a new client; decisions that might just stop something really bad from happening; decisions that control how much damage a big issue causes.

This module covers…

  • The four Ts of risk management
  • How to use these effectively at work
  • The benefits of doing it right

Sign up for your no commitment trial

Get your free access now!