Training
All employees of your enterprise have understood (but do not
necessarily agree) how important information and its risk-adjusted
protection is for sustainable business success. In a third step your
employees shall declare their agreement with the topic and learn how
to practically implement information security and assess it as a
whole.
Our offer
-
Identify risk sources, estimate and evaluate risks
-
Handling of sensitive information within the enterprise and in the
general public
-
Proper use of software packages and facilities for information
processing
-
Handling of passwords and mobile devices
-
Handling of laptops, mobile phones, PDAs and smart-phones
-
Use of telephones, e-mail and Internet
-
Behavior unter social engineering attacks
The training contents are in each case carefully tailored to the needs
of your enterprise and the respective target audience and practically
worked out in workshops with case studies, exercises in the group or
alone, role plays, etc.
|