
Cyber Security AWARENESS
RedBlue Global is delighted to offer a computer-based security awareness program that allows you to learn and practice the latest cyber security threats in hands-on simulations.
We deliver the most relevant content with industry-specific training. It prepares every employee for the unique threats they face in their role and department. Our trainings, with access to our library of modules, can be easily tailored to meet the needs of every organisation.
Tools such as “module preview” and “time-to-complete calculations” make course development easy for anyone. Participants don’t just watch or listen to our security awareness training. Instead, they are challenged to solve hands-on simulations that replicate what they will encounter in the real world.
Our modules include:
-
Privacy, PII and GDPR
-
Working remotely
-
Breach notification (HIPAA/HITECH)
-
Insider Threat
-
Encryption
-
Phishing
-
Malware, Ransomware
-
Password Security
Privacy, PII and GDPR

This security awareness training module covers the European Union General Data Protection Regulation (EU GDPR) which will went into effect in May 2018. It begins with an introduction to the concept of Privacy within the context of information security, followed by a brief overview of the main goals and objectives of EU GDPR. The module discusses Personal information in more detail, providing the EU GDPR definition and common examples of personal data and related data types.
Other important EU GDPR terminology, including “data subject,” “processing,” “data processors,” and “data controllers,” is also covered. The module also delves into common privacy violations and their consequences, including penalties stipulated by EU GDPR. Data Protection Principles are covered as the foundation of EU GDPR.
Specific aspects of the regulation are covered, with emphasis on the rights of the Data Subject, Breach Notification requirements, and the Data Protection Officer position. An important part of the training is the discussion of personal information life cycle and general best practices for collecting, storing, using, sharing, and disposing of personal information securely.
Contact UsWorking remotely

This interactive module is specifically designed for remote workers. It details networking essentials and best security practices to keep remote personnel secure.
Contact UsBreach notification (HIPAA/HITECH)

Breach notification (HIPAA/HITECH) – This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. Main topics:
- HIPAA’s definition of a breach
- breach disclosure requirements (and the concept of “safe harbor”)
- recommended breach detection and notification methods.
Insider Threat

Insider threats include security threats posed by employees, contractors or vendors. This module explains why malicious insiders are dangerous, and provides examples of common behaviours that can be indicators of insider threats. Suggestions for incident reporting are also included to help combat insider threats.
Contact UsEncryption

This module explains the concept of encryption in plain English. It describes the encryption process, types of assets that can be encrypted, and emphasizes the importance of following encryption-related policies to protect sensitive information.
Contact UsPhishing

This module helps to identify a phishing scam, know what happens during an attack and how to mitigate the threat of an attack.
Contact UsMalware, Ransomware

Ransomware is malware (malicious software), that holds technology for ransom. This module will show learners how ransomware works, what to do if an infection occurs and how to avoid future infections.
Contact UsPasword Security

The interactive Password Security module teaches learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.
Contact UsRead our Blog

Prepare for cyber threats
A serious security incident is a question of “when,” not “if.” In 2016 and 2017 we have seen number of...
Read more >
Importance of awareness
A serious security incident is a question of “when”, not “if". In 2016 we have seen a number of remarkable...
Read more >