The Power of a Strong Password * The Danger of Viruses and Malware * Keeping Your Data Safe * Keeping Your Mobile Safe
The Risks of Ransomware * Network Security and Cloud Computing * Phishing and Anti-Spam Software * Social Engineering
Internet of Things Attacks * Security and Compliance * Audits * Identity Theft * GDPR
Data Protection * Data Breaches * PCI DSS (Payment Card Compliance) * Information Security * Wi-Fi Security
Use of External Drives * Incident Management and Response * Threat Surveillance (24/7 Monitoring) * Penetration Testing
Information Security Governance * IT Disaster Recovery and Fallback * Secure Remote Working * Coding and Cybersecurity
Responding to a Ransomware Attack * Password Management Applied * The risks of public WiFi and the use of VPNs * Types of VPNs
The Basics of Cryptography * Choosing a Cloud Vendor * Threat Monitoring * Covert Crypto Mining
Application Security Vulnerabilities * Cybersecurity and Your Supply Chain * Security Doesn't Stop at Work
The Risks of Shadow IT * The Use of Password less Authentication * How to work well with your IT Teams
Physical Security * Security and AI * Automation and Integration * Using Open Source tools securely
Cybersecurity and HR * Secure File Sharing * Social Media Security Awareness