I am always ready to learn although I do not always like being taught.Winston Churchill
Under this credo, we have been successfully providing training for many years. Knowledge sharing at eye level is essential, otherwise training of the best experts will be a failure.
Why do we offer training?
Jede Woche lesen wir von neuen, erfolgreichen Cyberattacken auf Unternehmen. Die Angriffe erfolgen in der Regel über fingierte E-Mails. Öffnet nun ein Mitarbeiter den verseuchten Anhang oder gibt Daten auf einer gefälschten Website ein, steht den Angreifern Tür und Tor offen. Daher müssen Ihre Mitarbeiter wissen, wie solche Bedrohungen erkannt werden können bevor es zu spät ist.
Every week we read about new, successful cyber attacks on businesses. The attacks are usually made via fake emails. If an employee opens the contaminated attachment or enters data on a fake website, attackers reached their goal. Therefore, your employees need to know how to detect such threats before it’s too late.
It is not enough to know that attackers at the moment send fake application documents. Once this information is publicly known, attackers switch to a new method. In addition, more and more cybercriminals are using artificial intelligence. In that case, your business receives customized, fake messages. In the text, the sender refers to a real business transaction, an offer actually made or quotes from a previous messages. You are only able recognize such messages if you have been trained to do so.
In our training, we’ll show you and your staff how to spot threats regardless of the chosen attack method. We’ll explain which file formats are particularly dangerous and tell you what to do when such a message ends up in your mailbox.
Of course, our trainings not only deal with e-mail messages but also cover all areas of IT security and data protection. Some other areas are:
- how employees have to behave, who work from home
- what possibilities exist to bring malicious software to your system and how do you prevent that
- how do you protect notebooks, USB sticks and other in-house documents?
- what to do if a data subject request is received
- how do you recognize social engineering?
Are you interested in our expertise? Contact us via the attached contact form.