Skip to content

CyberFocus by Skillcast

Cost-effective Cybersecurity Training for Small Businesses

At any given time, criminals are seeking to hack, phish or defraud your company through cyberattacks. Whilst it's important to have technical defences against such attacks, it is even more crucial to minimise human error with continuous training and awareness.

CyberFocus is the perfect solution for small businesses (up to 50 employees) to provide compliance training to their staff. It provides dozens of short and in-depth e-learning modules covering all aspects of cybersecurity. You also get your own e-learning portal to manage users and download reports.

cyberfocus_1

Why Choose CyberFocus?

Comprehensive Training 

  • With over 30 modules, CyberFocus is our comprehensive cyber package that covers the fundamentals of cybersecurity.
  • From recognising phishing attempts to understanding the latest in malware threats, your staff will gain the knowledge needed to protect your organisation.
  • Designed with busy professionals in mind, with microlearning courses to ensure your team can absorb critical information effectively without overwhelming their schedules.

Perfect for All Levels

  • CyberFocus is tailored for both entry-level and suitable as an add-on for users. Whether you're just beginning your cybersecurity journey or looking to expand your existing training, it provides the right resources to meet your needs.
  • Learning about cybersecurity doesn't have to be dull. Our interactive modules and real-world scenarios keep your staff engaged and motivated, ensuring better retention and application of knowledge.

Explore some of the courses available with CyberFocus

Information Security Compliance Training Course

In-depth 35 Minutes DORA All staff

The security of client and internal information is critical for businesses.

Cybersecurity Awareness Training Course

Express 20 Minutes Cybersecurity DORA All staff

Most businesses conduct some or all of their operations using digital media.

Phishing

Express 15 Minutes Cybersecurity DORA All staff

It's essential for your employees to know what phishing is, how to spot the signs of an attempt and how to protect themselves and your Company.

DORA Compliance Online Training Course

In-depth 25 Minutes DORA All staff

The Digital Operational Resilience Act (DORA) is a regulatory framework set by the European Union to enhance the cybersecurity and operational resilience of financial institutions.

Try our CyberFocus courses for free

Start your free trial today to get access to our CyberFocus plan.

Start your trial

Information Security

Refresher 20 Minutes Cybersecurity DORA All staff

The loss or theft of commercially sensitive information may damage revenues, reputation and consumer trust.

Spot a Phishing Attempt

Microlearning 5 Minutes Cybersecurity DORA All staff

Phishing emails are fraudulent attempts by cybercriminals to trick individuals into revealing sensitive information.

Business Email Compromise

Microlearning 5 Minutes Cybersecurity DORA All staff

Business Email Compromise (BEC) is a targeted cyberattack where criminals impersonate executives or hack accounts to steal money or sensitive information.

Business Continuity Management

In-depth 40 Minutes DORA All staff

Despite the best risk management efforts, some events will be beyond your control, and your Company needs to plan for them accordingly.

Operational Risk

In-depth 50 Minutes DORA All staff

Our Operational Risk Course will help your employees understand companies' common operational risks, including legal and compliance risk, third-party risk and cyber risk.

Records Management

Express 20 Minutes DORA All staff

Records management refers to employees' creation, storage, archiving, and disposal of business records.

Deepfake Awareness

Microlearning 5 Minutes Cybersecurity DORA All staff

Deepfakes use artificial intelligence to create fake images, audio or videos that can deceive individuals and organisations.

Common Cyber Threats

Microlearning 5 Minutes Cybersecurity DORA All staff

Cyber threats such as phishing, malware, ransomware and unsecured networks pose significant risks to businesses.

Zero Trust Cybersecurity

Microlearning 5 Minutes Cybersecurity DORA All staff

The zero trust cybersecurity model ensures IT systems remain inaccessible by default, requiring strict verification before granting access.

Bring Your Own Device Security

Microlearning 5 Minutes DORA Cybersecurity All staff

Bring Your Own Device (BYOD) policies offer convenience and flexibility but also introduce cybersecurity risks.

Device Hygiene

Microlearning 5 Minutes DORA Cybersecurity All staff

Device hygiene is the practice of keeping digital devices secure and free from cyber threats to protect company data and networks.

Malware

Microlearning 5 Minutes DORA Cybersecurity All staff

Malware is malicious software designed to harm or exploit computer systems, ranging from viruses and ransomware to spyware and botnets.

Ransomware

Microlearning 5 Minutes Cybersecurity DORA All staff

Ransomware is a type of malware that encrypts files and demands payment for their release, often causing severe financial and operational damage.

Smishing

Microlearning 5 Minutes Cybersecurity DORA All staff

Smishing is a targeted phishing scam that uses deceptive text messages to gain sensitive information.

Spear Phishing

Microlearning 5 Minutes Cybersecurity DORA All staff

Spear phishing targets specific individuals with convincing emails designed to deceive them.

Video Conferencing

Microlearning 5 Minutes Cybersecurity DORA All staff

Video conferencing is a vital business tool, but it also presents security and privacy risks if not used correctly.

Vishing

Microlearning 5 Minutes Cybersecurity DORA All staff

Vishing is a social engineering attack where cybercriminals use phone calls to trick individuals into revealing sensitive information.

Creating Strong Passwords

Microlearning 5 Minutes Cybersecurity DORA All staff

Strong password protection is essential to safeguarding company systems from cyber threats such as brute force attacks and password guessing.

Multi-factor Authentication

Microlearning 5 Minutes Cybersecurity DORA All staff

Multi-factor authentication (MFA) enhances security by requiring users to verify their identity through multiple authentication methods.

Reacting to Password Breaches

Microlearning 5 Minutes Cybersecurity DORA All staff

Password breaches can lead to unauthorised access, fraud and data theft, often resulting from weak passwords, phishing or insecure networks.

Information Classification

Microlearning 5 Minutes Cybersecurity DORA All staff

This training helps employees understand different levels of information classification, their restrictions and how to handle data securely.

Information Security on the Move

Microlearning 5 Minutes Cybersecurity DORA All staff

Handling company information securely, especially when working remotely or traveling, is essential to prevent data breaches and security risks.

Tailgating and Piggybacking

Microlearning 5 Minutes Cybersecurity DORA All staff

Cybersecurity is not just about digital protection but also involves securing physical access to critical systems.

Secure Web Browsing

Microlearning 5 Minutes Cybersecurity DORA All staff

Practicing safe web browsing helps to reduce security risks and protect sensitive information.

Supply Chain Cybersecurity

Microlearning 5 Minutes Cybersecurity DORA All staff

A company’s cybersecurity is only as strong as its weakest link and supply chain vulnerabilities can expose businesses to major breaches.

Transferring Information Securely

Microlearning 5 Minutes Cybersecurity DORA All staff

Securely transferring information is essential to protect sensitive data from breaches, legal risks and business disruptions.

Using Wi-Fi safely

Microlearning 5 Minutes Cybersecurity DORA All staff

Wi-Fi connectivity offers convenience but also exposes devices and data to security risks if not properly managed.

Advising Customers on Cybersecurity

Microlearning 5 Minutes Cybersecurity DORA All staff

Cybersecurity is everyone's responsibility, including guiding customers to protect themselves from online threats.

CEO Fraud

Microlearning 5 Minutes Cybersecurity DORA All staff

CEO fraud is a type of Business Email Compromise where cybercriminals impersonate executives to trick employees into making payments or sharing confidential information.

Guide to Secure Remote Working

Microlearning 5 Minutes Cybersecurity DORA All staff

Remote work provides flexibility but also introduces cybersecurity risks that can compromise company data and systems.

Think Before You Click

Microlearning 5 Minutes Cybersecurity DORA All staff

Clicking on malicious links or attachments is one of the most common ways cybercriminals infect IT systems with malware.

CyberFocus Course Specifications

Structure

Approximately 10 hours of training including in-course assessments.

Audience

Suitable for all staff - examples and interactivities designed for staff at all levels. No previous knowledge or experience required.

Design

SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via a client style sheet.

FastTrack Option

Ability to offer optional test-out, whereby users can choose to skip the course content and complete the learning assignment simply by passing the assessment.

Compatibility

All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility). AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC.

Tailoring

Fully customisable on Skillcast Portal CMS.

Translation

Pre-translated versions not available, but all text content can be exported for translation into all languages.

Localisation

Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary.

Start Your CyberFocus Trial

Don't wait for a breach...

CyberFocus offers a quick, affordable solution to equip your team with the knowledge and awareness to identify, prevent, and react to cyber threats.

Safeguard your organisation’s sensitive information with our interactive course, covering a wide range of topics, from phishing to data protection, ensuring your staff is prepared for digital challenges.