Loading reviews…

Very good

This user gave this course a rating of 5/5 stars

Interesting & informative

This user gave this course a rating of 5/5 stars

Wrong, in several places

Firstly, having 5 stars as the default entry of course rating on this survey is terrible statistics. It should default to no answer, in order not to bias responses (and failing to do so implies you intend to massage the statistics). With regards to secure passwords, the UK government (via the NCSC) now recommends a secure password be three (or more) random words, rather than the abomination of letters and numbers you suggested. The reason is that password length has a much bigger impact on secureness than swapping letters for numbers or using exclamation marks – and passwords made of actual words are much MUCH easier to remember (and thus people don't write them on postit notes stuck on the bottom of their screen). The advice your course gives is not current to NCSC guidelines.

good

This user gave this course a rating of 5/5 stars

Covers most areas. OK for the length

Maybe mention importance of monitoring and patching zero day vulnerabilities, reporting anything in the news etc to the cyber security team they may have missed. separation of passwords between home and work systems and even different systems/sites on both. A long password is not secure if used elsewhere. Home Wifi can also be insecure as any wifi can be brute forced or subject to a dictionary attack even in wpa2. If questions were an image format it would prevent people copying them as easily.

Essential information in one short course

This is a great course for all organisations to help staff and volunteers increase their awareness of cyber attacks and what can essentially be a threat from all sources.

Training was structure and delivered well

This user gave this course a rating of 5/5 stars

Very well focussed course on the challenges of the modern work environment.

This user gave this course a rating of 4/5 stars

Thorough and informative

This was a very thorough course of the different ways in which your technological devices are vulnerable to malicious intent. It helped to offer tips on how to reduce this probability, which were easy to understand and follow through.

.

.