iTrain Scotland IT Training Edinburgh image
Home > Courses > Cyber Security courses > Cyber Security for Office Staff

Cyber Security for Office Staff

Cybercrime is a growing threat to UK business, these days it is a matter of when rather than if an attack will take place. Recent surveys by The Federation of Small Businesses (FSB) and the UK Government found that 66% of small businesses experienced cybercrime within the last 2 years[1], while large businesses experienced cyber breaches or attacks at a rate of 65% over the last year.[2]

Most, if not all, security breaches will involve some element of human error and investing in staff training is a key element to minimise the impact and costs of cyber risks to your business. Staff training and awareness programmes can also help reduce the cost of related insurance premium.

No matter your role within your workplace, you play a vital part in preventing cyber security incidents. This course will greatly increase your awareness of cyber risks and provide you with simple and effective information to give you confidence in spotting and preventing these risks materialising.


None.  This course is suitable for all individuals working in an office environment without technical IT security training.

By the end of this course delegates will:

  • Understand common cyber risks, their potential impacts on businesses and how they materialise
  • Review examples of cyber risks materialising
  • Understand the key topics, red flags and best practice in relation to preventing cyber risks materialising
  • Given guidance in actions to take if risks do materialise
  • Be sign posted to further useful sources of information
  • Be assessed on the to ensure, and re-enforce, competency on the course content

2 Hour Workshop:


  • Define a cyber risk?
  • The perpetrators and their motives?
  • Dispelling Cyber security misconceptions
  • The role employees play

Common Cyber Risks

  • Social Engineering
  • Malware
  • Ransomware
  • Phishing
  • Spear Phishing
  • Business Email Compromise
  • Spoofing
  • Data Breaches

Impacts of Cyber Attacks

  • What are the impacts of successful cyber-attacks?
  • Example – Online banking fraud
  • Example – Ransomware
  • Example – Business Email Compromise


  • The importance of passwords
  • What are the risks to passwords?
  • What happens when they are compromised?
  • Password bad habits
  • Password best practice

Email Security

  • Did you know, the 419 scam and why email is like a letter?
  • What are the threats?
  • Red flags – what to look out for?
  • The best practice steps to follow

Browser Security

  • What do we use them for?
  • Threats delivered through the browser?
  • Red flags - what to watch out for?
  • Browser Security – Best Practice

Company and Personal Data

  • How is it used against us?
  • What is out there and where?
  • Steps to take to minimise data loss?

Device Security

  • Software security
  • Physical security

Mobile Working

  • Device and physical security
  • Wireless networks
  • Mobile devices
  • Shoulder surfing

What to do when it goes wrong

  • Plan for the worst - training and processes
  • What actions should you consider taking?

Useful resources

  • Discussion of some useful resources available to delegates


  • Any additional questions?


  • 15mins multiple choice assessment