A risk analysis is a useful tool for any organisation who wants to anticipate incidents and mitigate the risks. You will be able to identify vulnerabilities and obtain a good overview of risks in your organisation.
Click the button and fill out the form to receive your free risk assessment template. This blogpost helps you put the risk analysis into use.
IT Security Policy Template
The IT security policy is an effective tool for organisations to communicate their objectives about IT security. We recommend combining it with the Acceptable Use Policy template to ensure employees know what they can and cannot do.
Click the button and fill out the form to receive your free it security policy. This blogpost helps you put the IT security policy into use
Acceptable Use Policy Template
The Acceptable Use Policy (AUP) is an integral part of the framework of information security policies. It includes specific rules and guidelines for your organisation to follow and is concrete and actionable.
Click the button and fill out the form to receive your free Acceptable Use Policy Template. This blogpost helps you put the Acceptable Use Policy into use.
Password Policy Template
Get our password policy template and create a foundation for stronger passwords in your organization today!
A well-crafted password policy helps you keep your organization's accounts and data better protected. Read more about the principles behind a strong password strategy
An example of a specific phishing campaign and the actual statistics
Our case study has an example of a phishing mail that we sent through our phishing training. See how many fell for the trap!