CyberFocus by Skillcast
Cost-effective Cybersecurity Training for Small Businesses
At any given time, criminals are seeking to hack, phish or defraud your company through cyberattacks. Whilst it's important to have technical defences against such attacks, it is even more crucial to minimise human error with continuous training and awareness.
CyberFocus is the perfect solution for small businesses (up to 50 employees) to provide compliance training to their staff. It provides dozens of short and in-depth e-learning modules covering all aspects of cybersecurity. You also get your own e-learning portal to manage users and download reports.
Why Choose CyberFocus?
Comprehensive Training
- With over 30 modules, CyberFocus is our comprehensive cyber package that covers the fundamentals of cybersecurity.
- From recognising phishing attempts to understanding the latest in malware threats, your staff will gain the knowledge needed to protect your organisation.
- Designed with busy professionals in mind, with microlearning courses to ensure your team can absorb critical information effectively without overwhelming their schedules.
Perfect for All Levels
- CyberFocus is tailored for both entry-level and suitable as an add-on for users. Whether you're just beginning your cybersecurity journey or looking to expand your existing training, it provides the right resources to meet your needs.
- Learning about cybersecurity doesn't have to be dull. Our interactive modules and real-world scenarios keep your staff engaged and motivated, ensuring better retention and application of knowledge.
Explore some of the courses available with CyberFocus
Information Security Compliance Training Course
The security of client and internal information is critical for businesses.
Read more
Cybersecurity Awareness Training Course
Most businesses conduct some or all of their operations using digital media.
Read more
Phishing
It's essential for your employees to know what phishing is, how to spot the signs of an attempt and how to protect themselves and your Company.
DORA Compliance Online Training Course
The Digital Operational Resilience Act (DORA) is a regulatory framework set by the European Union to enhance the cybersecurity and operational resilience of financial institutions.
Read more
Try our CyberFocus courses for free
Start your free trial today to get access to our CyberFocus plan.
Information Security
The loss or theft of commercially sensitive information may damage revenues, reputation and consumer trust.
Spot a Phishing Attempt
Phishing emails are fraudulent attempts by cybercriminals to trick individuals into revealing sensitive information.
Business Email Compromise
Business Email Compromise (BEC) is a targeted cyberattack where criminals impersonate executives or hack accounts to steal money or sensitive information.
Business Continuity Management
Despite the best risk management efforts, some events will be beyond your control, and your Company needs to plan for them accordingly.
Read more
Operational Risk
Our Operational Risk Course will help your employees understand companies' common operational risks, including legal and compliance risk, third-party risk and cyber risk.
Read more
Records Management
Records management refers to employees' creation, storage, archiving, and disposal of business records.
Deepfake Awareness
Deepfakes use artificial intelligence to create fake images, audio or videos that can deceive individuals and organisations.
Common Cyber Threats
Cyber threats such as phishing, malware, ransomware and unsecured networks pose significant risks to businesses.
Zero Trust Cybersecurity
The zero trust cybersecurity model ensures IT systems remain inaccessible by default, requiring strict verification before granting access.
Bring Your Own Device Security
Bring Your Own Device (BYOD) policies offer convenience and flexibility but also introduce cybersecurity risks.
Device Hygiene
Device hygiene is the practice of keeping digital devices secure and free from cyber threats to protect company data and networks.
Malware
Malware is malicious software designed to harm or exploit computer systems, ranging from viruses and ransomware to spyware and botnets.
Ransomware
Ransomware is a type of malware that encrypts files and demands payment for their release, often causing severe financial and operational damage.
Smishing
Smishing is a targeted phishing scam that uses deceptive text messages to gain sensitive information.
Spear Phishing
Spear phishing targets specific individuals with convincing emails designed to deceive them.
Video Conferencing
Video conferencing is a vital business tool, but it also presents security and privacy risks if not used correctly.
Vishing
Vishing is a social engineering attack where cybercriminals use phone calls to trick individuals into revealing sensitive information.
Creating Strong Passwords
Strong password protection is essential to safeguarding company systems from cyber threats such as brute force attacks and password guessing.
Multi-factor Authentication
Multi-factor authentication (MFA) enhances security by requiring users to verify their identity through multiple authentication methods.
Reacting to Password Breaches
Password breaches can lead to unauthorised access, fraud and data theft, often resulting from weak passwords, phishing or insecure networks.
Information Classification
This training helps employees understand different levels of information classification, their restrictions and how to handle data securely.
Information Security on the Move
Handling company information securely, especially when working remotely or traveling, is essential to prevent data breaches and security risks.
Tailgating and Piggybacking
Cybersecurity is not just about digital protection but also involves securing physical access to critical systems.
Secure Web Browsing
Practicing safe web browsing helps to reduce security risks and protect sensitive information.
Supply Chain Cybersecurity
A company’s cybersecurity is only as strong as its weakest link and supply chain vulnerabilities can expose businesses to major breaches.
Transferring Information Securely
Securely transferring information is essential to protect sensitive data from breaches, legal risks and business disruptions.
Using Wi-Fi safely
Wi-Fi connectivity offers convenience but also exposes devices and data to security risks if not properly managed.
Advising Customers on Cybersecurity
Cybersecurity is everyone's responsibility, including guiding customers to protect themselves from online threats.
CEO Fraud
CEO fraud is a type of Business Email Compromise where cybercriminals impersonate executives to trick employees into making payments or sharing confidential information.
Guide to Secure Remote Working
Remote work provides flexibility but also introduces cybersecurity risks that can compromise company data and systems.
Think Before You Click
Clicking on malicious links or attachments is one of the most common ways cybercriminals infect IT systems with malware.
CyberFocus Course Specifications
Structure
Approximately 10 hours of training including in-course assessments.
Audience
Suitable for all staff - examples and interactivities designed for staff at all levels. No previous knowledge or experience required.
Design
SHARD-compliant, responsive display on all devices, accessibility on screen readers, visual design controlled via a client style sheet.
FastTrack Option
Ability to offer optional test-out, whereby users can choose to skip the course content and complete the learning assignment simply by passing the assessment.
Compatibility
All Windows, Mac OSX, iOS, Android (Flash-free for mobile compatibility). AICC and SCORM 1.2-compliant, suitable for both hosted and deployed SCORM or AICC.
Tailoring
Fully customisable on Skillcast Portal CMS.
Translation
Pre-translated versions not available, but all text content can be exported for translation into all languages.
Localisation
Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary.
Start Your CyberFocus Trial
Don't wait for a breach...
CyberFocus offers a quick, affordable solution to equip your team with the knowledge and awareness to identify, prevent, and react to cyber threats.
Safeguard your organisation’s sensitive information with our interactive course, covering a wide range of topics, from phishing to data protection, ensuring your staff is prepared for digital challenges.