We've updated our Sexual Harassment Courses to include changes to The Worker Protection Act

Online Courses FAQs

Choosing the right course or knowing which one best suits your requirements can be difficult, here we answer the most commonly asked questions about popular topics to help.

Cyber Security at Work FAQs

Anyone who uses a electronic device with access to the internet for work needs to be aware of Cyber Security best practices.

  • How is cyber security used?

    Cyber security is used to prevent hackers and scammers from infiltrating the computers and personal files of victims. It can take the form of various preventative measures, including anti-virus software and user care.

  • What are security policy requirements?

    Every security policy is different depending on the nature of the business. Some common requirements include policy for:

    • Password use
    • Email use
    • Social media and internet use
    • Control of customer data
    • Classification of data
    • Handling of security breaches
    • Computer security and encryption

  • What are the benefits of cyber security?

    There are a variety of benefits to good cyber security. They include:

    • Protection for your business activities
    • Higher customer confidence
    • Fewer web outages which could damage your business
    • Better productivity on virus-free computers
    • Secure customer and client data

  • What are the benefits of having a strong information security policy?

    The fundamental advantage to having a strong information security policy is that it protects information integral to your business and your clients. Additional benefits include more protection in the face of cyber attacks, higher understanding of security threats, and added trust for the client.

    Cyber security is good for business, find out more with our guide.

  • What are the benefits of ISO 27001?

    The benefits of ISO 27001 are varied and numerous, but the main one surrounds customer and client trust. An ISO 27001 certificate indicates to prospective clients that the holding business is trustworthy and that its storage of customer data is secure. It also shows that the business has swift and robust countermeasures to potential data breaches.

  • What are the three types of security?

    Security controls are separated into three different categories – these categories are preventative, detective and responsive.

  • What are the types of cyber security threats?

    There are a number of different cyber security threats, each with their own preventative methods. These include phishing attacks, ransomware, DDoS attacks and computer viruses.

  • What certifications are needed for cyber security?

    There are various certifications which can be used for cyber security. For individuals, each certificate demonstrates an intimate knowledge of various important aspects in the field such as ethical hacking and security managing. For businesses, the ISO 27001 is the standard specification which demonstrates a company’s dedication to tried and tested cyber security.

  • What counts as a data breach?

    A data breach is an incident when confidential and protected data has been accessed or stole by unauthorized figures. The information can be of any kind including financial, personal or for business purposes.

  • What does cyber crime mean?

    Cyber crime is the term used to describe use of illegal methods to carry out criminal activities online on the internet.