DIGITAL SAFETY TRAINING

FOR DIGITAL SECURITY TRAINING TO BE EFFECTIVE, YOU NEED TO SEE WHAT THE RISKS LOOK LIKE.

AT LEITHAN WE PROVIDE GOVERNMENT RECOMMENDED TECHNIQUES TO ENSURE YOU AND YOUR STAFF REMAIN SAFE ONLINE, BOTH AT HOME AND AT WORK.

Traditional security courses tell you what to do.  Our program flips the script: we show you what actually happens when digital safety is ignored. By walking you through real‑world scenarios — complete with references to your own organisation — you will see how quickly a business can be compromised and held hostage, unless everyone plays their part by being digitally secure.

  • Short Format - we keep the training to less than an hour, ensuring your staff remain engaged throughout.

  • Relatable case studies – vivid, step‑by‑step demonstrations of attacks that unfold in minutes.

  • Actionable guidance aligned with government standards – every recommendation maps directly to National Cyber Security Centre standards, so you can be confident you’re meeting regulatory expectations.

  • Empowered staff, stronger defenses – your employees learn practical habits that protect them personally and fortify the entire organization against future threats.

  • 15 years of experience in both digital investigations and researching how hackers operate.

Implementing these proven measures not only safeguards individual users, it creates a resilient, security‑first culture across the whole company. In our short training course, tailored to last less than one hour, we will cover the following topics.

YOUR STARTING POSITION

At this point in time, what does a hacker see when looking at your organisation. Does it provide clues that can be explored?

WHAT OTHER INFORMATION WILL A HACKER HAVE?

Outside of the organisation, hackers have access to a large cache of data, potentially providing them with personal details and passwords.

WORST CASE SCENARIOS

What could happen (and regularly does) if we don’t ensure we are being digitally secure? How this affects staff personally, and the organisation as a whole.

RECOMMENDED TECHNIQUES

From passwords, and how to use them safely, to ensuring we virus check our computers regularly - especially when working from home….and what is 2FA?

THE FUTURE

The future is difficult to predict, we know for a fact that AI will play a huge role in both attacking and defending our security - from fake voice calls, to using AI to work out our passwords.

EXTRA TIPS

What is the most effective way to be secure when travelling, should we use VPN software (we’ll explain what it is). How do we identify phishing attacks? Does the Chief Executive need to be even more secure? Are our suppliers a concern?

BOOKINGS & COSTS

OUR SHORT TRAINING COURSE TYPICALLY TAKES LESS THAN AN HOUR AND IS DELIVERED ON SITE.

Please let us know of suitable dates for on site training, your location, and how many people will be at the session, and we can provide an accurate cost.

  • BUSINESS INVESTIGATIONS

    We investigate a variety of commercial issues that have a digital component. We specialize in uncovering everything from cloned websites and fraudulent activities to threats against your organization and its employees.

  • PRIVATE INVESTIGATIONS

    When you're facing digital crime like stalking, imitation, or intellectual property theft, it can be difficult to know where to turn. We have the techniques and systems to help you identify the culprits and take back control.

  • DIGITAL SAFETY TRAINING

    We help you stay secure online by providing practical methods to protect your information. We understand the tactics used by those who try to gain access to your data, and we can show you how to avoid being compromised.

  • OPEN SOURCE INTELLIGENCE

    Open-Source Intelligence (OSINT) is a specialised field that involves collecting and analysing publicly available information about a person, group, or organisation. We use OSINT to gather technical data that helps prevent crime, identify culprits, and analyze behaviors that could harm an individual or business.