Training

All employees of your enterprise have understood (but do not necessarily agree) how important information and its risk-adjusted protection is for sustainable business success. In a third step your employees shall declare their agreement with the topic and learn how to practically implement information security and assess it as a whole.

Our offer

  • Identify risk sources, estimate and evaluate risks
  • Handling of sensitive information within the enterprise and in the general public
  • Proper use of software packages and facilities for information processing
  • Handling of passwords and mobile devices
  • Handling of laptops, mobile phones, PDAs and smart-phones
  • Use of telephones, e-mail and Internet
  • Behavior unter social engineering attacks

The training contents are in each case carefully tailored to the needs of your enterprise and the respective target audience and practically worked out in workshops with case studies, exercises in the group or alone, role plays, etc.