Frequently Asked Questions
If you can't find the information you are looking for, this is the place to look.
Online Demonstration
Take NeoComm's Computer-based Security Awareness Training program for a test-drive.
Content Overview
NeoComm's Security Awareness Training program is the most comprehensive security awareness training program available. Find out what topics are covered together with relevant references to the ISO 17799 International Security Standard.
Screen Shots
NeoComm's Security Awareness Training program has a bright, fun and professional user interface, making it easy to use for people with advanced computer skills, as well as those with novice computer skills.
Brochure
Download a brochure outlining the features and benefits of NeoComm's Security Awareness Training program.
Case Studies
Find out what other customers have to say about NeoComm's Security Awareness Training program.
Security Awareness Training
The following is an overview of the content covered in NeoCommís Security Awareness Training program. Headings with references in italics indicate areas of the ISO 17799 security standard covered by that topic.

Introduction Importance of security
Protecting Information Classification and labelling of information (8.7.2)
Disposing of corporate information (8.6.1, 8.6.2)
Security of media in transit (8.7.3)
Using corporate credit cards
Case Study
Securing the workplace Physical Entry Controls (7.1.2)
Securing offices, rooms and facilities (7.1.3-d:g:h)
Working in secure areas (7.1.4-b:d:e)
Isolated delivery and loading areas (7.5.1-c:d:e)
Equipment siting and protection (7.2.1-e)
Secure disposal or re-use of equipment (7.2.6)
Case Study
Security Incidents Reporting security incidents (6.3.1)
Reporting security weaknesses (6.3.2)
Case Study
In the office Clear desk policy (7.3.1)
Securing unattended equipment (9.3.2)
Securing unattended computer sessions (9.3.2)
Removal of corporate assets (7.3.2)
Case Study
Outside the Office Protecting computing assets while mobile (9.8.1, 7.2.5)
Using mobile computing facilities in public (8.7.7, 9.8.1)
Using mobile computing facilities in the home (9.8.2)
Voice privacy (8.7.7)
Case Study
Computer Resources Passwords (9.3.1, 9.5.2-g.2)
Protection against malicious software (8.3.1)
Case Study
Email and Internet Personal use
Email usage (8.7.4.2)
Internet usage
Home     Corporate Profile     Services     Solutions     Partners     Contact Us