More than ever, your users are the weak link in your network security. They need to be trained on important capabilities of using and protecting valuable resources in the 21st century, and after the training, stay on their toes, keeping security top of mind.
With the fast penetration of ICTs into our daily work and life, cybersecurity needs to be treated as a matter of business risk. This therefore calls for collaborative efforts with a mission of making your employees your first line of defense against the fast evolving cyber threat landscape.
Our awareness training is designed to expose both the non-technical and technical users to latest cyber-threats, techniques hackers use to penetrate systems and how unsuspecting users are often used to complete the job easily. Through this training therefore users are then trained on how to detect threats, respond to threats and stay clear of common attack vectors used by attackers.
What Our Trainings Cover
Whereas we always ensure to tailor our training programs to the exact needs of our clients, we focus on these key areas which through our indepth research, we have found them to be pertinent and pressing to the largest percentage of our clients
This module covers various non-technical techniques hackers use to exploit the weak human element inorder to access confidential information. Through interactive case-study based training approach, trainees are taken through three main areas of attack: digital attacks, in-person attacks, and phone attacks.
Safe Web Browsing
In this fun, fully interactive module, trainees will learn about interesting facts about the World Wide Web, how to avoid common dangers, and the "do's and "don'ts" of safe web browsing.
This module covers the rules of how to create and use strong passwords in both an office environment and at home. Trainees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.
This module defines social engineering and shows how hackers can infiltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers real-life examples of just how dangerous email spoofing can b
Mobile Device Security
This module specializes in making sure trainees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.
Handling Sensitive Data
This module specializes in making sure your employees understand the importance of safely handling sensitive information, like Personally Identifiable Information (PII), Protected Health Information (PHI), Credit Card data (PCI DSS), Controlled Unclassified Information (CUI), including your organization’s proprietary information and are able to apply this knowledge in their day-to-day job for compliance with regulations.
In this engaging and interactive module, you will learn how to defend yourself against what is commonly referred to as the “business email compromise" and what is commonly known as CEO fraud. You will also learn how and why these attacks occur as well as how to protect your organization from this serious threat and then apply this knowledge in a short exercise.
Your role, Internet Security and You!
Today’s threats are sleek, sophisticated, and very slippery. They can slide right through your organization’s antivirus software and spam filters and go straight to your inbox. This is a high quality interactive module takes you on a tour of the threat landscape and shows you some of the common ways the bad guys try to trick you.
Regulations and Compliance
This module delves in-depth into various government and union designed data privacy regulations and compliance issues. Some of the notable laws covered are DPP (Uganda), GDPR (European Union), Bank of Uganda regulations and association based responsibilities.