Cybersecurity - storage and retention

Light grey icon of a clock

10

min

Identity theft can occur as a result of data breaches. This module explores the causes of data breaches as well as risk-reduction strategies for individuals and businesses.

WCAG 2.2 AA accessibility

Add your branding

Designed by learning designers

Cybersecurity - storage and retention
Cybersecurity - storage and retention
Cybersecurity - storage and retention
Cybersecurity - storage and retention

Learning outcomes

After completing the module, you’ll be able to:

  • Reflect on your data-sharing practices;
  • Recognise how data breaches occur;
  • Explain what businesses can do to meet data security obligations;
  • Outline strategies to reduce the risk of a breach for both individuals and businesses;
  • Describe what to do in the event of a breach, including where to get help.

Course features

Pencil icon

Assessment

Speech bubble icon

Audio transcript

Volume icon

Audio

Video icon

Video

Accessibility icon

WCAG AA 2.2 compliant


Start training your teams and customers today

Book a demo or consult

Related course

10

min

Cybersecurity - social media

Cybersecurity - social media

Explore social media best practices to protect personal information. Safeguard against scammers and prevent identity fraud in this insightful module.

10

min

Cybersecurity - don't get phished

Cybersecurity - don't get phished

Scammers are smarter and more cunning then ever. In this module learn to spot the warning signs to avoid being scammed and having your personal and business information hacked.

10

min

Cybersecurity - password awareness

Cybersecurity - password awareness

Cybersecurity is now a business critical issue. This module will educate your workforce on the importance of password protection reducing the risk of hacks and breaches that could jeopardize your identity.

Related blog