<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/cybersecurity/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Tue, 16 Jan 2024 16:57:31 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Cybersecurity Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Security for Charities</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-charities/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 20:49:56 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Charities]]></category>
		<category><![CDATA[Charity]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Charities]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Charities]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2772</guid>

					<description><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. <span id="more-2772"></span>By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips to help your cyber security for charities and enable you to bolster your cyber security posture.<img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2774" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg" alt="Cyber Security for Charities" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<p>&nbsp;</p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your staff and volunteers to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff and Volunteers:</h3>
<p>Start by ensuring that all staff and volunteers are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your charity vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your charity&#8217;s data is crucial. Choose a secure, reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive charity data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for charities</h3>
<p>Cyber security is of paramount importance for charities, as it protects sensitive data and preserves the trust of supporters. By following these essential cyber security tips, charities can significantly strengthen their defences against cyber threats. Maintain a proactive approach to cyber security for charities, regularly review and update your security measures, and stay vigilant to evolving risks. With robust cyber security measures in place, your charity can continue making a positive impact while safeguarding its digital assets.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business, so we can focus on delivering appropriate and <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">relevant services</a> to this sector. Also, we offer a 10% discount on all of our standard rates to registered charities.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security for Small Business</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-small-business/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 17:20:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Small Business]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Small Business]]></category>
		<category><![CDATA[Small Business]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2764</guid>

					<description><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. <span id="more-2764"></span>Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your cyber security for small business and stay safe in the online realm.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-2768" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg" alt="Cyber Security for Small Business" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your employees to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff:</h3>
<p>Start by ensuring that all employees are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your business vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your business data is crucial. Choose a reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive business data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for small business</h3>
<p>Protecting your small business from cyber threats should be a top priority. By following these simple cyber security tips, you can significantly enhance your defences and minimise the risk of breaches and data loss. Remember, a proactive approach to cyber security for small business is the key to keeping your business safe in the digital world. Stay vigilant and regularly review your security measures to adapt to evolving threats.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business too, so we do offer <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">various services</a> which are suited to this sector.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A la carte Security Training</title>
		<link>https://www.l2cybersecurity.com/training-a-la-carte-security/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 20:29:44 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Awareness Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Training]]></category>
		<category><![CDATA[Staff Cyber Security Training]]></category>
		<category><![CDATA[Staff Security Awareness]]></category>
		<category><![CDATA[Staff Security Awareness Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2066</guid>

					<description><![CDATA[<p>À la carte Security Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following À la carte Security Training, in an online and in-person format. Title: À la carte Cyber Security Training. Learning objective: We can offer you tailor made training to make your staff aware&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/training-a-la-carte-security/">A la carte Security Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2066 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2066"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">À la carte Security Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/A-la-carte-Security-Training.pdf" target="_self" class="pp-button" role="button" download="A-la-carte-Security-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=À%20la%20carte%20Security%20Training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20À%20la%20carte%20Security%20Training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following À la carte Security Training, in an online and in-person format.</p>
<h2>Title: À la carte Cyber Security Training.</h2>
<h2>Learning objective:</h2>
<p>We can offer you tailor made training to make your staff aware of the types of threats that exist in your industry sector, and how they manifest themselves. By taking our training, your staff will be skilled to become another layer of protection against threats to your network.</p>
<h2>Our range of topics to choose from include:</h2>
<h3>Scams and Malicious Software:</h3>
<ul>
<li>Catching social engineering tricks – 20 minutes</li>
<li>Spotting phishing, smishing and vishing – 40 mins</li>
<li>Overview of malicious software (AKA malware) – 20 mins</li>
<li>How to handle Ransomware – 30 mins</li>
</ul>
<h3>Protecting your online life:</h3>
<ul>
<li>Keeping young people safe – 20 mins</li>
<li>Staying safe on Social Media – 20 mins</li>
<li>How to handle a cyber incident – 30 mins</li>
</ul>
<h3>Best Practices:</h3>
<ul>
<li>Protecting online accounts (passwords and authentication) – 40 mins</li>
<li>Using mobile devices securely – 20 mins</li>
<li>Securing the office or home (including work-from-home environment) – 20 mins</li>
<li>How to implement a proper backup strategy – 20 mins</li>
<li>Why are updates/patches so important – 20 mins</li>
</ul>
<h2>Duration:</h2>
<p>The duration for each topic is listed above, which includes time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Staff who have no knowledge of online risks or those who wish to improve their awareness of the ever changing cyber security aspects of the online world.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/training-a-la-carte-security/">A la carte Security Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Staff Security Awareness Training</title>
		<link>https://www.l2cybersecurity.com/training-staff-security-awareness/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 20:07:13 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Awareness Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Training]]></category>
		<category><![CDATA[Staff Cyber Security Training]]></category>
		<category><![CDATA[Staff Security Awareness]]></category>
		<category><![CDATA[Staff Security Awareness Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2062</guid>

					<description><![CDATA[<p>Staff Security Awareness Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Staff Security Training, in an online and in-person format. Title: Cyber Security Awareness Training for staff. Learning objective: The purpose of this programme is to equip the learner with the knowledge and skill&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/training-staff-security-awareness/">Staff Security Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2062 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2062"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Staff Security Awareness Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Staff-Security-Awareness-Training.pdf" target="_self" class="pp-button" role="button" download="Staff-Security-Awareness-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Staff%20security%20awareness%20training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20staff%20security%20awarenesss%20training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Staff Security Training, in an online and in-person format.</p>
<h2>Title: Cyber Security Awareness Training for staff.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify many various threats when using the internet and know what steps to take to protect themselves from these threats.</p>
<h2>Content of the Staff Security Awareness Training:</h2>
<p>There are three separate Modules in this training. Some of the content could also apply to people's home life. If they learn to be safe in the office, they can apply this at home too.</p>
<h3>1.   Module 1 – Social engineering and dodgy emails</h3>
<p style="padding-left: 40px;">An in-depth look at how criminals use social engineering and then perpetrate various email scams. You will find out how to avoid falling victim to these tactics.</p>
<h3>2.   Module 2 – Protecting your online world</h3>
<p style="padding-left: 40px;">Learning simple and effective password and authentication practices, as well as how to stay safe when using Social Media.</p>
<h3>3.   Module 3 – Securing your IT and handling a cyber incident</h3>
<p style="padding-left: 40px;">Good practices for securing your IT assets (Backups, Updates and Wi-Fi setup). How to deal with a cyber security incident.</p>
<p>There will be lots of examples of the different types of scams that will target staff. There are short videos also included to show real world examples of hacking. There will also be plenty of tips and tricks on how to be safer and more secure online, including how to be careful with Social Media.</p>
<h2>Duration:</h2>
<p>Each module takes 60 minutes, including ample time for Questions and Answers.</p>
<p>A standard session covers modules 1 and 2 as a minimum (two hours).</p>
<h2>Audience:</h2>
<p>Staff who have no knowledge of online risks or those who wish to improve their awareness of the ever changing cyber security aspects of the online world.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/training-staff-security-awareness/">Staff Security Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Board Management Security Briefing</title>
		<link>https://www.l2cybersecurity.com/board-management-security-briefing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 19:50:59 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Board Cyber Security Briefing]]></category>
		<category><![CDATA[Board Management Security Briefing]]></category>
		<category><![CDATA[Board of Directors]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Briefing]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Management Cyber Security Briefing]]></category>
		<category><![CDATA[Security Briefing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2057</guid>

					<description><![CDATA[<p>Board/Management Security Briefing Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format. Title: Cyber Security Briefing for Boards or Management. Briefing Objective: The purpose of this programme is to equip the members of the board/management with the knowledge&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/board-management-security-briefing/">Board Management Security Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2057 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2057"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Board/Management Security Briefing</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Board-Management-Security-Briefing.pdf" target="_self" class="pp-button" role="button" download="Board-Management-Security-Briefing.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea83e6d5e64" data-node="5eea83e6d5e64">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Board/Management%20Security%20Briefing%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20the%20Board/Management%20Security%20Briefing,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format.</p>
<h2>Title: Cyber Security Briefing for Boards or Management.</h2>
<h2>Briefing Objective:</h2>
<p>The purpose of this programme is to equip the members of the board/management with the knowledge of the current cyber security threats that target their organisation’s activities and know what strategy they should take to protect the organisation.</p>
<h2>Content of the Board/Management Briefing:</h2>
<ul>
<li>Overview of current global cyber threats</li>
<li>An introduction to the specific risks faced by the organisation</li>
<li>Outline a remediation strategy for the organisation</li>
</ul>
<h2>Duration:</h2>
<p>The briefing will take 40-50 minutes. There will then be plenty of time for Questions and Answers.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/board-management-security-briefing/">Board Management Security Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
