Skip to content

Information Security

The security of client and internal information is critical for businesses. The consequences of information loss or theft are severe.

The loss or theft of commercially sensitive information may lead to lost revenues, damage to reputation, reduced consumer trust, and even affect a company's survival.

Failure to respect information security may lead to disciplinary measures, fines and even criminal prosecution under various laws.

Our Information Security Training Course helps employees understand information classification, data security, network security, access control to your offices, and prevent information loss or theft.

  • 35 Minutes
  • All staff
  • Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary.

Learning objectives

  • Understand why information security is critical to our business
  • Recognise the consequences of data breaches
  • Learn how and why information is classified
  • Exercise caution when using the internet, emails and other electronic communications
  • Comply with Company procedures in relation to network access, portable media and devices, and physical security
  • Know how and when to report actual or suspected data breaches

    What can you expect your employees to learn?

Introduction

Why is information security important?

  • Consequences of information security breaches
  • What do you think?

Our information security policy

  • What information is covered?

Information lifecycle

  • Information classification
  • You decide: Classifying information

Email security

  • Best practice for using emails
  • What do you think?
  • Scenario: Alana's email

Information security on the move

  • Best practice for securing information when travelling
  • Scenario: On vacation
  • Scenario: Corinna's trip
  • Using portable media
  • Portable media: What should you do?
  • Scenario: Using portable media

Network access

  • Access control: What should you do?
  • Scenario: Jonathan's new job
  • Password policy
  • Password policy guidelines
  • Scenario: Mark's event
  • Best practice for accessing the internet
  • Scenario: The suspected hack
  • What are the risks of online meeting platforms?

Physical access

  • Physical security measures
  • What should you do?
  • Scenario: Physical security

Preventing information security breaches

  • Reporting breaches
  • You decide: Report or not?
  • Information security & the law

Summary

Affirmation

Assessment

Start your compliance e-learning journey with a free trial

Our no-obligation free trial gives you access to our libraries and compliance platform. 

Ready to start your free trial? Complete the form, and a member of the Skillcast team will be in touch with further details.

Your questions, answered

Where can I track incidents involving personal data?

Tools such as a Data Breach Register enable you to log, track, and respond to data breaches and similar incidents efficiently. Skillcast offers this tool, making it easy to document and manage incidents in line with compliance requirements.

How can I benchmark my team's cybersecurity awareness?

An anonymous cybersecurity awareness survey can assess your team's understanding of critical security practices. Skillcast offers ready-to-use surveys to benchmark awareness levels and identify areas needing extra focus.

How can I benchmark my team's cyber security awareness?

An anonymous cybersecurity awareness survey can assess your team’s understanding of critical security practices. Skillcast offers ready-to-use surveys to benchmark awareness levels and identify areas needing extra focus.

Are Skillcast courses SCORM-compliant?

Yes. This means they can be delivered via the Skillcast Portal or any other SCORM-compliant Learning Management System.

What other tools are needed beyond training?

A comprehensive compliance solution often needs more than just training. Alongside e-learning, tools like declarationssurveys, and registers that track compliance tasks are usually essential. Skillcast provides full support to help you set up these additional tools.

Is our training content still compliant with the latest legislation?

  • You can check the latest course content updates in our library updates page: https://www.skillcast.com/compliance-course-library-updates
  • For major legislative changes, we:
    • Will send you email alerts to ensure you are notified
    • Offer you a free trial of newly created or updated content
    • Host webinars with compliance experts to explain the changes and how our training supports your ongoing compliance

Can you translate our content into other languages?

Yes, we offer translations in a wide range of languages. Let us know your needs, and we’ll confirm availability or work with you to plan translations for your selected modules.

How can I give employees a secure way to record suspicious activity so we can act quickly?

Our Suspicious Activity Register allows staff to log concerns or irregularities they observe, helping you detect potential issues early. The secure register can be reviewed by compliance teams, enabling prompt investigation and action.

What file types are supported by the Skillcast system?

Features

Supported file types and details

File Exchange

File types: PDF, Excel spreadsheets, Word documents, SCORM and xAPI files, and compressed zip files. Max file size: Default is 1GB, can be increased to a max of 2GB

SCORM files

Versions: SCORM 1.2, SCORM 1.2 for Moodle, SCORM 2004 2nd, 3rd and 4th Edition. Max file size: 1024MB

xAPI file

Max file size: 2GB

Videos

File types: MP4 or MOV. Videos must be optimised, with a max file size of 100MB. If the file is bigger, our Design Team can help

Images

File types: jpg, png and gif. The file size should ideally be 100KB, but it can be up to 250KB

CPD evidence

File types: Word, PDF, Excel and CSV. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB

Policy documents

PDF or Word File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB

Offline activities evidence

File types: PDF, DOC, DOCX, XLS, XLSX, CSV, PNG, GIF, JPEG, JPG, PPTX and MSG. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB

Client logo files

File types provided by client: EPS, PDF, AI and SVG

Registers

PDF, DOC, DOCX, XLS, XLSX, CSV, PPT, PPTX, POT, PPA, PPS, JPG, JPEG, PJEPG, PNG, BMP, GIF, MP4, MOV, WMV, CPTX, CP, TXT, ZIP and MSG files

Declarations

JPG, JPEG, PNG, GIF, XLS and XLSX files


 

-->