Course | |||||
---|---|---|---|---|---|
Compliance Essentials Think about all the data you hold within a business. You’ll have names and addresses on file, maybe even more sensitive data about staff and customers’ health or personal preferences. In the wrong hands, that kind of information can lead to... | |||||
Cybersecurity How many times have you opened a new app and typed the same password you’ve had since forever? And if it doesn’t accept it, you say, “Ok, I’ll add a 1 on the end. A capital letter? Fine. Now it wants to recommend a password too? How on... | |||||
Cybersecurity There are lots of sci-fi classics about dystopian futures where the human race is enslaved by the technology it has created. All of this used to sound implausible, but take one look at social media today and you’ll see we’re not that far... | |||||
Cybersecurity There are currently over 4.5 billion internet users. That’s a mind-boggling amount of people creating data – no wonder the internet is called the “information superhighway.” With every webpage you visit, you leave a digital footprint. In... | |||||
Cybersecurity Who could have predicted that the sum total of all knowledge in the world would be accessible through a tiny device that we all keep in our pockets? Even fewer could’ve predicted that we only seem to use it to watch cute kitty videos. Totally... | |||||
Cybersecurity Would you leave your house without first checking that all windows and doors are locked? Of course you wouldn’t, unless you live in a magical dreamland. Maybe you have a strong alarm system or motion detectors in place, too. These are vital and... | |||||
Cybersecurity Ever received an email from your bank which seems to be legit but, well, there’s something off about it? Maybe it starts with, “Dear valued customer” instead of using your name? If you have received anything like this, then it’s likely... | |||||
Cybersecurity Imagine a world where you can feed your cat or dog remotely via your cell phone and the thermostat is set to your ideal, toasty temperature. Wait a minute – we already live in that world! Yep, the future, aka the Internet of Things, is here and... | |||||
Cybersecurity These days, pretty much every industry uses and stores some kind of data, so you need to think very carefully about how to protect it. Just running a garage business on the World Wide Web can see you handling personal data from the other side of... | |||||
Cybersecurity Data is the most prized resource in the world and is far more valuable than money, precious metals, or even oil. It’s no wonder then, that so many criminals seek to steal it. Every hour of every day, hackers and cybercriminals attempt to breach... |
A secure site is a web site that is protected from prying eyes. When information passes back and forth between our server and your computer, all the information is encrypted. That means that if anyone were to 'listen in' and see this data, they will not be able to decrypt or read what it means.
Blossom Training uses this security (known as SSL) throughout the site and all its subdomains to make sure that your personal information is not accessible by anyone but yourself.