Information SecurityHeads Up Compliance - Information Security Course Summary
In the ‘Internet Age’ we have seen the collection, storage and availability of data increase immeasurably. Similarly, use of technology has grown to the extent that our working and personal lives are augmented by products such as laptops and smartphones.
The Internet provides us with historically unparalleled breadth of contact. Naturally this access to information and ease of mass distribution coupled with portability and sophistication of hardware, can leave individuals and businesses vulnerable to attack.
Getting it wrong in relation to ‘Information Security’ can be costly and may lead to significant fines, and irreparable damage to reputation, so it is essential you get things right.
What You Will Learn
This course will introduce you to the concept of ‘Information Security’ and, in conjunction with your ongoing training, help you recognise the importance of effective security procedures in the workplace. This course will cover the following:
- What is meant by information security?
- What do we mean by physical security of information?
- How can individuals make the firm’s information more secure?
- How does this connect with data protection?
The Data Protection Act 1998
The 'Heads Up Compliance - Information Security' course begins with a short 5 minute video introducing the topic. It then moves on to examines different types of information security vulnerabilities, providing 'real world' scenarios. Finally, a multiple choice questionnaire allows the user to show their understanding of the material.