Employee training and awareness of computer security

Original price was: € 199,00.Current price is: € 0,00.


Awareness programs play an essential role in the fight against cybercrime. A good presentation explains why data protection is essential, how to protect the computer, and the security controls to use.

SKU: 44daaa5c-b1ed-4f4a-8e14-ae6233308791 Category: Tags: , , , , , , , , , , , , , , , , , , ,
Available in: English, Dutch, French, German, Spanish
  • The manager who needs to manage security in order to remain compliant with the latest ISO standards.
  • The HR manager who needs coach employees into the digital age.
  • The CIO who understands it's not the technology but it's the emplpyees'compliance where the risks are.
  • The Chief Information Security Officer (CISO) who needs to assess the employees' security awareness.
  • The consultant who needs to convince her client to upgrade security beyond just the techology.
Get the right tools
ensure that you have the right tools for your job

Know what to do
make sure you know how to use them

Keep it safe
protect your devices and data from viruses, malware and other threats

Use common sense
avoid risky situations like opening attachments in email or clicking on links in emails

Be aware of new threats daily
stay up-to-date with all the latest security news, research and developments

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. How are hardware and/or software security systems applied to removable media?
  1. Not
  2. Are data encrypted when stored on a USB drive?
  3. Data is encrypted when stored on a USB drive AND after login screen the screen is also locked

Q. Were all the necessary tools provided to perform your task?
  1. No
  2. Adequate equipment BUT insufficient training or experience
  3. Adequate equipment and training/experience provided
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
bcgBCG Traveling with Millennials Mar 2013_tcm9-96752.pdf
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.


    There are no reviews yet.

    Be the first to review “Employee training and awareness of computer security”

    Your email address will not be published. Required fields are marked *