Worried about the cost of cyber insurance?
Lower your risk with CyberSafe.
10 modules | 15 mins per module | CPD Accredited
From as little as US$2 per person
What is CyberSafe?
With lessons that incorporate elements of the Australian Government Cyber Security Centre Essential Eight, created by experts in online learning and cyber security holding Masters degrees including Masters in System Security, CyberSafe (Innovation Patent Number 2020102927) is world-class, bite-sized cybersecurity training starting from as little as US$2 per person per year.
Each of the 10 modules has 3 topics making 30 topics in total. With 4 time based multiple-choice questions per topic (12 questions per module) organisations can quickly identify which employees have completed and passed the training and are deemed to be Cyber Safe.
- Topics are designed to be completed within 5 minutes; modules within 15 minutes.
- Achieving 75% or more correct in each test earns the employee an Achievement Badge.
- Completing a minimum of 8 out of 10 modules earns the employee a Proficiency Certificate
- The program has been CPD Accredited. Contact us to enquire whether your professional body has accredited CPD for CyberSafe.
Managers have access to the CyberSafe Learning Management Platform delivering visibility on which employees have registered and completed each of the 30 topics across 10 modules including the questions they answered correctly as well as their overall score achieved and, importantly, which employees earned their Certificate of Proficiency.
The CyberSafe Learning Management Platform empowers Managers to identify and target areas of weakness within the team through additional learning.
Key Benefits of CyberSafe
1. Achieve Certified CyberSafe for your organisation based on:
i. 80% of employees earning a Certificate of Proficiency which demonstrates that once a year your staff have undergone training that is tested, graded and certified
ii. your organisation complying with at least 6 out of 8 of the Australian Government's prioritised list of mitigation strategies, the Essential Eight.
Earning then promoting the Certified CyberSafe badge on your website and stationery may:
a. satisfy Director Duty of Care requirements to look after the best interests of the organisation
b. assist insurance premium negotiations
c. impress investors who look for lower risk investments
d. send a message to customers that the business takes the security of their data seriously
e. let staff see that the business invests in their learning and development
2. Create continual awareness by encouraging employees to log in regularly to redo modules
3. Easily train new staff who are on boarded at any time during the year
4. CPD Accredited
What the team members learn:
i. password security
ii. multi-factor authentication
iii. password managers and best practices
i. types of phishing attacks
ii. risks presented by phishing
iii. how to avoid falling for a phishing attack
i. General Data Protection Regulation (GDPR)
ii. HIPAA Privacy & Security / PCI DSS
iii. Data Breach Notification / Data Protection Act
4. Websites & Software
i. the risks presented by malicious websites and software
ii. how to identify malicious websites and software
iii. how to stay safe when browsing the web
5. Physical security
i. common physical security vulnerabilities (e.g. tailgating, removable media, etc.)
ii. best practices to stay safe (e.g. clean desk policy)
iii. how to stay safe when working remotely (e.g. safe Wi-Fi usage)
i. types of malware
ii. how to identify polymorphic malware
iii. how malware attacks usually unfold
i. introduction to encryption
ii. types of ransomware (e.g. scareware)
iii. how to avoid ransomware attacks
8. Social Media
i. risk presented by social media usage at work
ii. difference between social media for work and for personal use
iii. how to handle sensitive customer data when using corporate social media
9. Social engineering
i. how to recognize and identify a social engineering attack
ii. how to safely extricate oneself from a social engineering attack
iii. types of sensitive information that should never be disclosed to anyone
10. Incident response
i. key steps and procedures to follow in case of an incident
ii. role of each employee in responding to an incident
iii. mock incidents for employees to practice responding to
What the manager gets:
The CyberSafe data analytics enable managers to identify and address gaps in an organisations cyber awareness by providing visibility over individual employee and team completion as well as performance statistics.