Group IT Security Training – In Person
- January 7, 2026
- Posted by: Client Services
- Categories:
IT Safety - Group TrainingIn-Person IT Security Training for your Employees

Did you know that most successful cyber attacks stem from human error?
Staff are your first line of defence in recognising threats (like phishing), following best practices (strong passwords, data handling), reporting incidents, and helping meet compliance, ultimately saving costs, protecting data, and building a strong security culture against evolving risks.
Building IT Security knowledge and regular training transforms employees from vulnerabilities into a proactive shield, safeguarding company assets and reputation.
Group sessions provide an interactive way of learning, open the floor to questions and help to identify any employees who may require further help.
Face-to-face courses are available locally only and are usually delivered on a Friday afternoon, taking approx 3-4hrs.
- Suitable for Employees, Contractors and Associates
- Training recommended annually
- Groups of up to 8 people in each session
- 3-4hrs training with interactive questions, small group exercises and quizzes
- Certificate of participation for each employee
- Feedback to employer on each individual employee’s training
- Can be used alone or in conjuction with our online video and simulation training

Our face-to-face, group sessions are intended for employees, contractors and associates. If you are looking for management training, please do get in touch to discuss your specific requirements.
Our sessions last around 3-4hrs and are broken down in to the following categories. The format is interactive with some categories ending with group exercises. There is an individual quiz at the end of training.
In-person risks
Discuss prevention of every day risks such as device security, information sharing, using external devices, adminstrator and general responsibilities
Hacking
What hacking is, why it happens and explores common types of hacking and how they could affect the company
Wi-fi and Connecting
Secure connections, Network Vulnerability, risks of public Wi-fi and the benefits of using a VPN
Email Safety
Discussion on recognising and handling spam, what it’s purpose is and how to utilise anti-virus scans and quarantine
Phishing
Understanding why Phishing happens, what the end game may be. Explore different types of phishing, why it is successful and how to recognise it
Passwords
Discussions on complex passwords and Multi-factor authentication, what it means, why they are necessary and how to utilise a password manager
Smartphones and Tablets
Protecting your company smartphone or device against hacking or unsolicited use
Personal Devices
Responsibilities of using a personal device for work and ensuring that a personal device can in no way impact the company network
Backing Up
Understanding the different ways to back up and their differences, understanding the importance
Reporting
See ‘personalisation’ tab
Policies
See ‘personalisation tab
Some sections of the group training can be personalised for your company:
Discussion prior to the training
The more we know about your company, your IT setup and current procedures, the better we can aim to use terminology that your employees are used to.
Reporting
This section of the training can be tailored to your own reporting procedures. We will add names of managers and IT staff whom your employees should contact and will also discuss the methods in which they should make contact. Action Fraud and any other legal requirement for reporting will remain within the training
Policies
Throughout the training session, policies come up numerous times, we make it part of the discussion to understand the content and importance of these policies. At the end of the session we would be happy to hand out any IT policies relevant to the training which require the employee signature and answer employee questions on these where possible. We do ask that we read these policies in advance and that any concerns we raise receive a response prior to the training date. Common policies handed out on the day include: IT Security Policy, Email & Internet Policy, Use of Personal Devices for Work Policy, Bring Your Own Device Policy, Phishing Policy etc