Password management: How to create and use strong
passwords and how to avoid common password-related
Email security: How to identify and avoid phishing emails,
spam, and malware.
Social engineering: How to recognise and avoid social
engineering scams, such as pretexting, baiting, and quid pro
Mobile device security: How to protect smartphones and
tablets from cyber threats.
Data protection: How to handle data securely, including
encryption, backup, and disposal.
Simulated phishing attacks: Custom phishing templates
used to orchestrate and SPAM and phishing attack which
includes analytics and reporting.
Incident response: How to report security incidents and what
steps to take in case of a cyber-attack.