Bomb threats and the placement of explosive devices are both actions that...
MORE INFOBomb threats and the placement of explosive devices are both actions that are designed to strike at the heart of your organisation.
The perpetrators of these crimes have one of two things in mind.....They want to disrupt the normal flow of business creating an atmosphere of anxiety and panic, or they want to injure people and damage property.
This program examines the strategy that should be adopted to deal with either or both of the situations. (Threat or Placement)
This program has been produced to be shown to all personnel who may become involved in a bomb threat incident.
RUNNING TIME: 5 Minutes
There are many reasons why a building, or a group of buildings may need to...
MORE INFOThere are many reasons why a building, or a group of buildings may need to be evacuated including:
The larger the building, the more organisation is required to ensure everyone is evacuated effectively and as safely as possible. But regardless of the size or type of building or buildings, or number of employees, every organisation should have a tried and tested evacuation plan.
This program covers:
Every Building must have a tried and tested evacuation plan, and everyone must be familiar with it, and know their role.
RUNNING TIME: 9 Minutes
Most of us are aware that bad lifting and carrying techniques are a major...
MORE INFOWe live in a digital world, and many of the threats that we face, in our...
MORE INFOWe live in a digital world, and many of the threats that we face, in our lives and at work, are now digital ones.
Cyber threats are a major issue for organisations, with the possibility of data breaches, financial loss and loss of valuable information.
The most common threats are:
This program will cover the types of cybersecurity threats and how best to identify them.
RUNNING TIME: 10 Minutes
A particularly dangerous form of cybersecurity risk is that of insider...
MORE INFOA particularly dangerous form of cybersecurity risk is that of insider threats.
These are cyber threats that originate from within the organisation which makes them especially difficult to detect and deal with.
Because an insider threat does not need to go through the process of gaining access to the system – as they’re already inside – they are often capable of going undetected for longer, and doing more damage, than external threats.
RUNNING TIME: 3 Minutes
Malware is software created and deployed to compromise or disrupt computer...
MORE INFOMalware is software created and deployed to compromise or disrupt computer systems. The consequences of a system becoming infected with malware can be devastating, including the breakdown of normal operations, the accessing of sensitive information by criminal actors, disruption to business and financial loss.
Any professional computer system should have malware protection set up, but there are also ways in which an individual can identify the possibility of malware, allowing them to take steps to prevent damage.
RUNNING TIME: 2 Minutes
Phishing is a type of social engineering – the practice of manipulating...
MORE INFOPhishing is a type of social engineering – the practice of manipulating people into giving up valuable information.
Signs to look out for to avoid phishing scams include:
RUNNING TIME: 3 Minutes
One specific and very damaging type of malware is ransomware. This is...
MORE INFOOne specific and very damaging type of malware is ransomware. This is software that infiltrates a system and stops it working, by locking or encrypting files to prevent access to them. The user of the ransomware will then demand a payment to unlock the system.
RUNNING TIME: 2 Minutes
Passwords are the first line of defence against hackers and scammers. Your...
MORE INFOPasswords are the first line of defence against hackers and scammers.
Your passwords should be strong and unique. Do not use anything that would be easy for someone who knows you to guess as your password. Use a mixture of letters, numbers, and symbols.
Ensure all physical documents and data are securely stored in a desk - preferably locked or appropriately destroyed and disposed of at the end of a work session.
RUNNING TIME: 3 Minutes
Browsing the internet is one of the main sources of danger when it comes to...
MORE INFOBrowsing the internet is one of the main sources of danger when it comes to your devices. It is a constant exchange of data through uploading and downloading with the website you are visiting.
When you’re using social media, it’s important to always be aware of what your social media presence might be exposing you to.
Public networks can be a major threat to maintaining digital hygiene as it can leave your devices vulnerable to threats from others connected to the same network.
RUNNING TIME: 4 Minutes
As programs that are not updated are more vulnerable to threats, old and...
MORE INFOAs programs that are not updated are more vulnerable to threats, old and unused software and apps should be deleted from your computer or device.
Often software providers will release updates or patches that have been created to address security weaknesses that have recently been identified.
Antivirus and Anti-malware software is also very important for digital systems.
RUNNING TIME: 2 Minutes
Most organisations will have a person, department, or contractor, that is...
MORE INFOMost organisations will have a person, department, or contractor, that is responsible for the management of computers and digital systems in an organisation.
Some of the practical steps outlined in this program may be managed entirely by such a department. Regardless, a basic understanding helps you be a first line of defence for your organisation, and you can apply these learnings when using your personal devices, computers, and systems to help keep yourself safe whenever you’re online.
RUNNING TIME: 2 Minutes
One of the best ways to defend against digital threats like computer...
MORE INFOOne of the best ways to defend against digital threats like computer viruses, software bugs, data loss and privacy breaches is through the regular practice of Digital Hygiene.
Digital Hygiene is about learning habits and practices to keep your systems and information secure.
Examples of Digital Hygiene include:
RUNNING TIME: 13 Minutes
All workplaces make use of some sort of Display Screen Equipment. Display...
MORE INFOAll workplaces make use of some sort of Display Screen Equipment. Display Screen Equipment, sometimes referred to as DSE, is any device, or piece of equipment that has an alphanumeric or graphic display screen.
Equipment categorised as display screen equipment include:
Tasks requiring prolonged use of display screen equipment can present real hazards to users. Use of that equipment requires proper management to control the hazards and reduce the risks to DSE users.
This program aims to raise awareness of DSE issues in the workplace. By paying close attention to the requirements of the job and the design of the workplace, the threat to individuals’ health and safety at work can be made as small, and the workplace experience made as comfortable, as possible.
RUNNING TIME: 12 Minutes
Ergonomics is the study of the relationship between people, the equipment...
MORE INFOErgonomics is the study of the relationship between people, the equipment they use and the physical environment in which they work.
Ergonomics is about the application of the knowledge of this relationship to benefit well-being, performance and improve both short and long term health and safety.
Subjects covered in the program include:
Compromises and often small improvement are the hallmarks of almost every organisation's commitment to ergonomics - however, long term results can be dramatic.
Applied properly, ergonomic principles will improve productivity, morale, health and safety.
This program is suitable for all in the workforce for an introduction to ergonomics and to reinforce the principles that must be employed when addressing ergonomic problems.
RUNNING TIME: 9 Minutes
Fire blankets are an important tool when fighting the spread of a fire. This...
MORE INFOFire blankets are an important tool when fighting the spread of a fire. This safety short gives you a quick overview of how to correctly use a fire blanket.
RUNNING TIME: 1 Minute