Every organization has its own unique approaches to data security: including company-specific policies, key contacts, and standards for encrypting or sharing information. That’s why, even though our Information Security content is ready for learners to dive into right away, we want you to make this content your own.
This guide tells you which lessons you can customize – by adding cards or uploading documents to the end of the lesson.
TRACK 1: The Basics of Information Security
To customize for your organization:
Add a copy of your information security guidelines to this lesson:
- 1.3: Minimize Data Security Risks
Add IT or data security contact information to this lesson:
- 1.3: Minimize Data Security Risks
TRACK 2: Recognize and Protect Against Security Threats
To customize for your organization:
Add a copy of your information security guidelines to these lessons:
- 2.3: Recognize Phishing Attempts
- 2.4: What Is Malware?
- 2.5: Protect Against Physical Security Threats
Add IT or data security contact information to these lessons:
- 2.2: What Is Phishing?
- 2.3: Recognize Phishing Attempts
- 2.4: What Is Malware?
- 2.7: Respond to a Data Breach
TRACK 3: Store and Share Information Securely
To customize for your organization:
Add a copy of your information security guidelines to these lessons:
- 3.1: Responsibly Store Sensitive Data*
- 3.2: Securely Share Sensitive Data*
- 3.3: Maintain Data Security When Working Remotely
*Lessons 3.1 and 3.2 deal in large part with encryption. Aside from including your data security manual as a reference, we recommend adding cards about your organization’s specific practices for data encryption and sharing.
Add IT or data security contact information to these lessons:
- 3.1: Responsibly Store Sensitive Data
- 3.2: Securely Share Sensitive Data
- 3.3: Maintain Data Security When Working Remotely
TRACK 4: Secure Your Devices from Intrusion
To customize for your organization:
Add a copy of your information security guidelines to these lessons:
- 4.2: Secure Your Devices at Work
- 4.3: What to Do When You Lose a Work Device
Add IT or data security contact information to these lessons:
- 4.2: Secure Your Devices at Work
- 4.3: What to Do When You Lose a Work Device
Get started with customizing this program today.
Pro tip: Check out this email template to share Information Security lessons with your team!
Comments
0 comments
Please sign in to leave a comment.