{"id":2439,"date":"2019-06-06T17:38:00","date_gmt":"2019-06-06T16:38:00","guid":{"rendered":"https:\/\/digital.lorators.com\/?p=2439"},"modified":"2020-07-23T19:27:43","modified_gmt":"2020-07-23T18:27:43","slug":"basic-cyber-security-training","status":"publish","type":"post","link":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/","title":{"rendered":"Basic Cyber Security Training"},"content":{"rendered":"<div id=\"pl-2439\"  class=\"panel-layout\" >\n<div id=\"pg-2439-0\"  class=\"panel-grid panel-has-style\"  data-style=\"{&quot;padding&quot;:&quot;0px&quot;,&quot;bottom_margin&quot;:&quot;0px&quot;,&quot;cell_alignment&quot;:&quot;flex-start&quot;,&quot;align&quot;:&quot;&quot;,&quot;background_image&quot;:false,&quot;overlay&quot;:&quot;&quot;,&quot;overlay_color&quot;:&quot;#000000&quot;}\" >\n<div style=\"padding: 0px 0; \" data-overlay=\"true\" data-overlay-color=\"#000000\" class=\"panel-row-style panel-row-style-for-2439-0\" >\n<div id=\"pgc-2439-0-0\"  class=\"panel-grid-cell\"  data-weight=\"1\" >\n<div id=\"panel-2439-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"0\" data-style=\"{&quot;padding&quot;:&quot;0px 0px 0px 0px&quot;,&quot;background_image_attachment&quot;:false,&quot;background_display&quot;:&quot;tile&quot;,&quot;margin&quot;:&quot;0px 0px 0px 0px&quot;,&quot;content_alignment&quot;:&quot;left&quot;,&quot;title_color&quot;:&quot;#443f3f&quot;,&quot;headings_color&quot;:&quot;#443f3f&quot;}\" >\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2439-0-0-0\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p>Cyber Security Threats are growing day-by-day as malicious actors disrupt I.T Systems and attempt to steal data.\u00a0 Every organisation is vulnerable to a cyber attack.<\/p>\n<p>This short Cyber Security Awareness Training covers the basics that everyone should know.<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"panel-2439-0-0-1\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"1\" data-style=\"{&quot;padding&quot;:&quot;0px 0px 0px 0px&quot;,&quot;background&quot;:&quot;#009933&quot;,&quot;background_image_attachment&quot;:false,&quot;background_display&quot;:&quot;tile&quot;,&quot;margin&quot;:&quot;0px 100px 0px 100px&quot;,&quot;content_alignment&quot;:&quot;left&quot;,&quot;title_color&quot;:&quot;#443f3f&quot;,&quot;headings_color&quot;:&quot;#443f3f&quot;}\" >\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2439-0-0-1\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/digital.lorators.com\/courses\/basic-cyber-security\/\"><span style=\"color: #ffffff;\">Take this Course<\/span><\/a><\/h4>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-2439-1\"  class=\"panel-grid panel-has-style\"  data-style=\"{&quot;padding&quot;:&quot;0px&quot;,&quot;bottom_margin&quot;:&quot;0px&quot;,&quot;cell_alignment&quot;:&quot;flex-start&quot;,&quot;align&quot;:&quot;&quot;,&quot;background_image&quot;:false,&quot;overlay&quot;:&quot;&quot;,&quot;overlay_color&quot;:&quot;#000000&quot;}\"  data-ratio=\"1\"  data-ratio-direction=\"right\" >\n<div style=\"padding: 0px 0; \" data-overlay=\"true\" data-overlay-color=\"#000000\" class=\"panel-row-style panel-row-style-for-2439-1\" >\n<div id=\"pgc-2439-1-0\"  class=\"panel-grid-cell\"  data-weight=\"0.5\" >\n<div id=\"panel-2439-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" data-style=\"{&quot;background_image_attachment&quot;:false,&quot;background_display&quot;:&quot;tile&quot;,&quot;content_alignment&quot;:&quot;left&quot;,&quot;title_color&quot;:&quot;#443f3f&quot;,&quot;headings_color&quot;:&quot;#443f3f&quot;}\" >\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2439-1-0-0\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<h3>Course Delivery<\/h3>\n<p><strong>&#x2705; Online: <\/strong>This course is delivered via the Digital.Lorators Online LMS.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pgc-2439-1-1\"  class=\"panel-grid-cell\"  data-weight=\"0.5\" >\n<div id=\"panel-2439-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" data-style=\"{&quot;background_image_attachment&quot;:false,&quot;background_display&quot;:&quot;tile&quot;,&quot;content_alignment&quot;:&quot;left&quot;,&quot;title_color&quot;:&quot;#443f3f&quot;,&quot;headings_color&quot;:&quot;#443f3f&quot;}\" >\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2439-1-1-0\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<h3>Course Author<\/h3>\n<p>This course was written by Robert Clements an Information Security Consultant at <a href=\"https:\/\/www.assentriskmanagement.co.uk\">Assent Risk Management<\/a>.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-2439-2\"  class=\"panel-grid panel-has-style\"  data-style=\"{&quot;padding&quot;:&quot;0px&quot;,&quot;bottom_margin&quot;:&quot;0px&quot;,&quot;cell_alignment&quot;:&quot;flex-start&quot;,&quot;align&quot;:&quot;&quot;,&quot;background_image&quot;:false,&quot;overlay&quot;:&quot;&quot;,&quot;overlay_color&quot;:&quot;#000000&quot;}\" >\n<div style=\"padding: 0px 0; \" data-overlay=\"true\" data-overlay-color=\"#000000\" class=\"panel-row-style panel-row-style-for-2439-2\" >\n<div id=\"pgc-2439-2-0\"  class=\"panel-grid-cell\"  data-weight=\"1\" >\n<div id=\"panel-2439-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"4\" data-style=\"{&quot;background_image_attachment&quot;:false,&quot;background_display&quot;:&quot;tile&quot;,&quot;content_alignment&quot;:&quot;left&quot;,&quot;title_color&quot;:&quot;#443f3f&quot;,&quot;headings_color&quot;:&quot;#443f3f&quot;}\" >\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2439-2-0-0\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<hr \/>\n<h4>Lessons<\/h4>\n<div class=\"post-603 is_not_sample\">\n<ul>\n<li><strong>Backup Your Data<\/strong><br \/>\nEnsure you can recover your data wherever it is located.<\/li>\n<li><strong>Malware Protection<\/strong><br \/>\nProtecting your devices means more than just Anti-Virus.<\/li>\n<li><strong>Protect Your Network<\/strong><br \/>\nKeep the world out.<\/li>\n<li><strong>Device Updates<\/strong><br \/>\nMake sure you apply security updates across all your devices.<\/li>\n<li><strong>User Accounts<\/strong><br \/>\nProtect your user accounts on every system you use.<\/li>\n<li><strong>Phishing<\/strong><br \/>\nBe Aware of Phishing Techniques that could compromise your data.<\/li>\n<li><strong>Going Further<\/strong><\/li>\n<\/ul>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"panel-2439-2-0-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"5\" data-style=\"{&quot;padding&quot;:&quot;0px 0px 0px 0px&quot;,&quot;background&quot;:&quot;#009933&quot;,&quot;background_image_attachment&quot;:false,&quot;background_display&quot;:&quot;tile&quot;,&quot;margin&quot;:&quot;0px 100px 0px 100px&quot;,&quot;content_alignment&quot;:&quot;left&quot;,&quot;title_color&quot;:&quot;#443f3f&quot;,&quot;headings_color&quot;:&quot;#443f3f&quot;}\" >\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2439-2-0-1\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<h4 style=\"text-align: center;\"><a href=\"https:\/\/digital.lorators.com\/courses\/basic-cyber-security\/\"><span style=\"color: #ffffff;\">Take this Course<\/span><\/a><\/h4>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"panel-2439-2-0-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"6\" data-style=\"{&quot;background_image_attachment&quot;:false,&quot;background_display&quot;:&quot;tile&quot;,&quot;content_alignment&quot;:&quot;left&quot;,&quot;title_color&quot;:&quot;#443f3f&quot;,&quot;headings_color&quot;:&quot;#443f3f&quot;}\" >\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-2439-2-0-2\" >\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p>&nbsp;<\/p>\n<h4>Do you need Cyber Security Consultancy?<\/h4>\n<p>Assent Risk Management can help you manage the Cyber Threat with <a href=\"https:\/\/www.assentriskmanagement.co.uk\/cyber-security\/\">Cyber Security Consultancy<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Threats are growing day-by-day as malicious actors disrupt I.T Systems and attempt to steal data.\u00a0 Every organisation is vulnerable to a cyber attack. This short Cyber Security Awareness Training covers the basics that everyone should know. &nbsp; Take this Course Course Delivery &#x2705; Online: This course is delivered via the Digital.Lorators Online LMS. [&hellip;]<\/p>\n","protected":false},"author":25,"featured_media":2441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[91,88,90,92,78,89],"tags":[],"class_list":["post-2439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-data-protection","category-information-security-online-courses","category-iso-27001","category-online-courses","category-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"featured_image_urls_v2":{"full":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png",567,567,false],"thumbnail":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01-150x150.png",150,150,true],"medium":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01-300x300.png",300,300,true],"medium_large":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png",567,567,false],"large":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png",567,567,false],"1536x1536":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png",567,567,false],"2048x2048":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png",567,567,false],"woocommerce_archive_thumbnail":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01-300x300.png",300,300,true],"mailchimp":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png",200,200,false],"woocommerce_thumbnail":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01-300x300.png",300,300,true],"woocommerce_single":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png",567,567,false],"woocommerce_gallery_thumbnail":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01-100x100.png",100,100,true],"sow-carousel-default":["https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01-272x182.png",272,182,true]},"post_excerpt_stackable_v2":"<p>Cyber Security Threats are growing day-by-day as malicious actors disrupt I.T Systems and attempt to steal data.\u00a0 Every organisation is vulnerable to a cyber attack. This short Cyber Security Awareness Training covers the basics that everyone should know. &nbsp; Take this Course Course Delivery &#x2705; Online: This course is delivered via the Digital.Lorators Online LMS. Course Author This course was written by Robert Clements an Information Security Consultant at Assent Risk Management. Lessons Backup Your Data Ensure you can recover your data wherever it is located. Malware Protection Protecting your devices means more than just Anti-Virus. Protect Your Network Keep&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/digital.lorators.com\/category\/online-courses\/cyber-security\/\" rel=\"category tag\">Cyber Security<\/a>, <a href=\"https:\/\/digital.lorators.com\/category\/online-courses\/data-protection\/\" rel=\"category tag\">Data Protection<\/a>, <a href=\"https:\/\/digital.lorators.com\/category\/online-courses\/information-security-online-courses\/\" rel=\"category tag\">Information Security<\/a>, <a href=\"https:\/\/digital.lorators.com\/category\/online-courses\/iso-27001\/\" rel=\"category tag\">ISO 27001<\/a>, <a href=\"https:\/\/digital.lorators.com\/category\/online-courses\/\" rel=\"category tag\">Online Courses<\/a>, <a href=\"https:\/\/digital.lorators.com\/category\/online-courses\/security\/\" rel=\"category tag\">Security<\/a>","author_info_v2":{"name":"Assent Risk Management","url":"https:\/\/digital.lorators.com\/author\/assent-risk-management\/"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Basic Cyber Security Training - Digital Lorators<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digital.lorators.com\/basic-cyber-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Basic Cyber Security Training - Digital Lorators\" \/>\n<meta property=\"og:description\" content=\"Cyber Security Threats are growing day-by-day as malicious actors disrupt I.T Systems and attempt to steal data.\u00a0 Every organisation is vulnerable to a cyber attack. This short Cyber Security Awareness Training covers the basics that everyone should know. &nbsp; Take this Course Course Delivery &#x2705; Online: This course is delivered via the Digital.Lorators Online LMS. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digital.lorators.com\/basic-cyber-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Lorators\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/loratorsuk\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-06T16:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-23T18:27:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"567\" \/>\n\t<meta property=\"og:image:height\" content=\"567\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Assent Risk Management\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lorators\" \/>\n<meta name=\"twitter:site\" content=\"@lorators\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Assent Risk Management\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/\"},\"author\":{\"name\":\"Assent Risk Management\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#\\\/schema\\\/person\\\/e2ce85e5f15ca09514af756afc35125c\"},\"headline\":\"Basic Cyber Security Training\",\"datePublished\":\"2019-06-06T16:38:00+00:00\",\"dateModified\":\"2020-07-23T18:27:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/\"},\"wordCount\":170,\"publisher\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digital.lorators.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Course-Temp-cyber-small-01.png\",\"articleSection\":[\"Cyber Security\",\"Data Protection\",\"Information Security\",\"ISO 27001\",\"Online Courses\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/\",\"url\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/\",\"name\":\"Basic Cyber Security Training - Digital Lorators\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digital.lorators.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Course-Temp-cyber-small-01.png\",\"datePublished\":\"2019-06-06T16:38:00+00:00\",\"dateModified\":\"2020-07-23T18:27:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digital.lorators.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Course-Temp-cyber-small-01.png\",\"contentUrl\":\"https:\\\/\\\/digital.lorators.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Course-Temp-cyber-small-01.png\",\"width\":567,\"height\":567,\"caption\":\"Cyber Security Online Training\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/basic-cyber-security-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digital.lorators.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic Cyber Security Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#website\",\"url\":\"https:\\\/\\\/digital.lorators.com\\\/\",\"name\":\"Digital Lorators\",\"description\":\"Online Training and eLearning\",\"publisher\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digital.lorators.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#organization\",\"name\":\"Lorators\",\"url\":\"https:\\\/\\\/digital.lorators.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digital.lorators.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/L2020-Circle-WText-White-HiRes-01-01.png\",\"contentUrl\":\"https:\\\/\\\/digital.lorators.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/L2020-Circle-WText-White-HiRes-01-01.png\",\"width\":1251,\"height\":417,\"caption\":\"Lorators\"},\"image\":{\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/loratorsuk\\\/\",\"https:\\\/\\\/x.com\\\/lorators\",\"https:\\\/\\\/twitter.com\\\/lorators\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/19229550\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digital.lorators.com\\\/#\\\/schema\\\/person\\\/e2ce85e5f15ca09514af756afc35125c\",\"name\":\"Assent Risk Management\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef383f03507a0e0d767b15a41dff9e07287f0e2ef5bf490f1a7c2be5addc0f0a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef383f03507a0e0d767b15a41dff9e07287f0e2ef5bf490f1a7c2be5addc0f0a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ef383f03507a0e0d767b15a41dff9e07287f0e2ef5bf490f1a7c2be5addc0f0a?s=96&d=mm&r=g\",\"caption\":\"Assent Risk Management\"},\"sameAs\":[\"http:\\\/\\\/www.assentriskmanagement.co.uk\"],\"url\":\"https:\\\/\\\/digital.lorators.com\\\/author\\\/assent-risk-management\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Basic Cyber Security Training - Digital Lorators","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/","og_locale":"en_GB","og_type":"article","og_title":"Basic Cyber Security Training - Digital Lorators","og_description":"Cyber Security Threats are growing day-by-day as malicious actors disrupt I.T Systems and attempt to steal data.\u00a0 Every organisation is vulnerable to a cyber attack. This short Cyber Security Awareness Training covers the basics that everyone should know. &nbsp; Take this Course Course Delivery &#x2705; Online: This course is delivered via the Digital.Lorators Online LMS. [&hellip;]","og_url":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/","og_site_name":"Digital Lorators","article_publisher":"https:\/\/www.facebook.com\/loratorsuk\/","article_published_time":"2019-06-06T16:38:00+00:00","article_modified_time":"2020-07-23T18:27:43+00:00","og_image":[{"width":567,"height":567,"url":"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png","type":"image\/png"}],"author":"Assent Risk Management","twitter_card":"summary_large_image","twitter_creator":"@lorators","twitter_site":"@lorators","twitter_misc":{"Written by":"Assent Risk Management","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/#article","isPartOf":{"@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/"},"author":{"name":"Assent Risk Management","@id":"https:\/\/digital.lorators.com\/#\/schema\/person\/e2ce85e5f15ca09514af756afc35125c"},"headline":"Basic Cyber Security Training","datePublished":"2019-06-06T16:38:00+00:00","dateModified":"2020-07-23T18:27:43+00:00","mainEntityOfPage":{"@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/"},"wordCount":170,"publisher":{"@id":"https:\/\/digital.lorators.com\/#organization"},"image":{"@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png","articleSection":["Cyber Security","Data Protection","Information Security","ISO 27001","Online Courses","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/","url":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/","name":"Basic Cyber Security Training - Digital Lorators","isPartOf":{"@id":"https:\/\/digital.lorators.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/#primaryimage"},"image":{"@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png","datePublished":"2019-06-06T16:38:00+00:00","dateModified":"2020-07-23T18:27:43+00:00","breadcrumb":{"@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digital.lorators.com\/basic-cyber-security-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/#primaryimage","url":"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png","contentUrl":"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/07\/Course-Temp-cyber-small-01.png","width":567,"height":567,"caption":"Cyber Security Online Training"},{"@type":"BreadcrumbList","@id":"https:\/\/digital.lorators.com\/basic-cyber-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digital.lorators.com\/"},{"@type":"ListItem","position":2,"name":"Basic Cyber Security Training"}]},{"@type":"WebSite","@id":"https:\/\/digital.lorators.com\/#website","url":"https:\/\/digital.lorators.com\/","name":"Digital Lorators","description":"Online Training and eLearning","publisher":{"@id":"https:\/\/digital.lorators.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digital.lorators.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/digital.lorators.com\/#organization","name":"Lorators","url":"https:\/\/digital.lorators.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/digital.lorators.com\/#\/schema\/logo\/image\/","url":"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/09\/L2020-Circle-WText-White-HiRes-01-01.png","contentUrl":"https:\/\/digital.lorators.com\/wp-content\/uploads\/2020\/09\/L2020-Circle-WText-White-HiRes-01-01.png","width":1251,"height":417,"caption":"Lorators"},"image":{"@id":"https:\/\/digital.lorators.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/loratorsuk\/","https:\/\/x.com\/lorators","https:\/\/twitter.com\/lorators","https:\/\/www.linkedin.com\/company\/19229550\/"]},{"@type":"Person","@id":"https:\/\/digital.lorators.com\/#\/schema\/person\/e2ce85e5f15ca09514af756afc35125c","name":"Assent Risk Management","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/ef383f03507a0e0d767b15a41dff9e07287f0e2ef5bf490f1a7c2be5addc0f0a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ef383f03507a0e0d767b15a41dff9e07287f0e2ef5bf490f1a7c2be5addc0f0a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef383f03507a0e0d767b15a41dff9e07287f0e2ef5bf490f1a7c2be5addc0f0a?s=96&d=mm&r=g","caption":"Assent Risk Management"},"sameAs":["http:\/\/www.assentriskmanagement.co.uk"],"url":"https:\/\/digital.lorators.com\/author\/assent-risk-management\/"}]}},"_links":{"self":[{"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/posts\/2439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/comments?post=2439"}],"version-history":[{"count":2,"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/posts\/2439\/revisions"}],"predecessor-version":[{"id":2442,"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/posts\/2439\/revisions\/2442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/media\/2441"}],"wp:attachment":[{"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/media?parent=2439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/categories?post=2439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digital.lorators.com\/wp-json\/wp\/v2\/tags?post=2439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}