Training

You can have the best technology and the most prudent policies but with out proper employee training you may still be vulnerable. Studies show that the vast majority of data breaches originate with a human fault. Our training courses will educate your management as well as employees on information security theory and best practices. Our curriculum will educate guiding entities so that top level decisions are made with a strong understanding of information security theory and policy. We also offer training programs for end user employees that will help them better secure assets and knowledge they are responsible for.

Passwords and Authentication

This area is the single most vulnerable human asset in information security. We cover the many common pit falls we see as well as ways to build better and easier to remember passwords. We also cover supplementary authentication methods that drastically reduce unauthorized access.

Malware and Viruses

We define and discuss the many kinds of malware and viruses that a user is likely to encounter. Our courses cover what kinds of behavior leads to malware infection and how to recognize malware infections so that corrective actions may be followed.

Social Engineering

Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques. Many techniqies such as pretexting, phising and baiting. We will tech you how to spot and avoid social engineering techniques as well as establish procedures to validate identities.

Information Management

These courses discuss how to determine, classify and secure sensitive information. We also discuss procedures and controls to limit information to only those employees that need access to perform their functions. Also included are emailing and telephone policies that will help to prevent the inadvertent disclosure of sensitive information.

Scroll to Top