Cybersecurity is today critically important for every organization that processes data. Just take a moment to think about what a successful cyberattack (e.g. ransomware) would mean for your organization. Would your organization be able to continue operating? What financial losses would such an attack cause? Educate your employees, because behind every successful cyberattack there is always a human factor.
Since we consider training in this area to be the most effective tool for raising awareness and professional preparedness of employees, as well as for preventing cybersecurity incidents, we have prepared an e-learning option for employee training. This approach saves travel costs (the lecturer does not travel to you), eliminates the need to organize employees at a specific time, and includes a final test that demonstrates the level of acquired knowledge.
For more information, contact us at obchod@somi.sk
Video preview – Cybersecurity and information security: practice instead of legal paragraphs
Good day,
I cannot help myself but need to praise the quality and content of the training. In my opinion, it is excellent and will certainly help our people better orient themselves in the cyber space. Today I listened to both parts. I also completed the test - 100% on the first attempt - but it definitely requires thinking through the questions. Thank you once again.
Ing. Marek Miklovič
IS Administrator, Web Administrator
City of Stará Turá
Section 46(1)(b) of Act No. 18/2018 Coll., or Article 39(1)(b) of the EU GDPR Regulation, refers to raising awareness and providing professional training to persons involved in processing operations—namely your employees who, in the course of their work, come into contact with personal data.
As we consider training in this area to be the best tool for increasing awareness and professional preparedness of authorized persons, as well as for preventing security incidents, we offer e-learning training for employees. This saves travel costs (the lecturer does not travel to you), removes the need to organize people at a specific time, and includes a final test that proves the level of acquired knowledge.
For more information, contact us at obchod@somi.sk
Video preview – Explanation of GDPR issues from a practical perspective:
Video preview – Internet and computer security (prevention of security incidents):
IT Security - Basic Training for Employees
During the training you will learn:
- How to log in to a computer (why not to use automatic login).
- How and why to use stronger passwords and how to remember them.
- Password management and why different passwords are required everywhere (examples of leaked passwords).
- How to safely use USB flash drives.
- Use of hardware-encrypted USB keys – advantages and disadvantages.
- How to encrypt a standard USB flash drive.
- Data encryption overview (BitLocker, VeraCrypt).
- Why data backup is important and backup options for PCs and mobile devices.
- How to behave on public Wi-Fi networks and what risks they pose.
- Why not to connect unknown devices to your computer.
- Why and what pop-up windows appear when installing new software.
- Use of encrypted protocols for common services such as web and email, and how to recognize them.
- Difference between encrypted communication and encrypted email (S/MIME vs. PGP).
- What phishing is and how to protect yourself against it.
- What a certificate is and how it works (personal and server certificates).
- What cookies are and what trackers are.
- How to browse the internet safely.
- Anti-theft protection for mobile devices.
- Physical security of electronic devices.
The training takes place at the client's premises and lasts 2 to 3 hours.
IT Security - Advanced Training for Administrators
This training includes topics from the basic employee training and is based on practical demonstrations and hands-on administration of individual security tools and components.
Additionally, you will learn:
- How to encrypt a standard USB drive (BitLocker demonstration).
- How to encrypt files, disk partitions, virtual encrypted containers; differences between encryption methods; mobile device encryption.
- How to create encrypted containers (VeraCrypt).
- How to encrypt email.
- How to configure an email client and S/MIME certificate (how to obtain it + installation in Thunderbird and Outlook).
- Example phishing email – how it works.
- How to change user permissions on PCs and assign access rights.
- Why to set password policies in Local Security Policy and a general discussion on user passwords.
- Controlled use of USB media on computers using various tools (e.g. ESET or Local Policy Editor).
- Blocking employee access to inappropriate websites.
- Physical network security (cabling and securing Ethernet sockets).
- What security on the L2 layer is.
- How to prevent unauthorized devices from accessing the network.
- Is Wi-Fi secure at all? How to reduce Wi-Fi risks in your own network.
- General discussion and debate on NAC (Network Access Control).
The training takes place at our company premises (max. 8 people) in a separate training room and lasts 6 hours.
We recommend bringing your own laptop. Parking is available on company premises.
Contact us and we will prepare customized training tailored to your skills and preferred area.