Watch out for intruders

A hacker attack can come strolling through the front door in broad daylight. That's what our two new e-learning courses are all about. Here's a short clip from one of the videos.

E-learning about intruders

How to safeguard physical data security in the workplace

A hacker attack doesn't always come via the internet. A hacker attack can start with a guest slipping in through the front door - without anyone noticing.

While many hacker attacks start with a phishing email, hackers can use physical tools - and it can go horribly wrong.


A small electronic gadget - a dongle - can be completely harmless.
But it can also be a hacker's tool, giving hackers a way into our data and triggering a major data breach, surveillance or ransomware extortion.

Employees need to be aware

To protect our offices and our organisation against threats from cyber intruders in the workplace, it's crucial that every employee plays an active role. But how?

That's the topic of our two e-learning modules on intruders.


Cyber spies at work

Course module #17 is all about how hackers can steal our data if they manage to sneak into our offices and areas with dongles, USB sticks or electronic gadgets.

The main points of the course, among other things:

  • Dongles and small electronic gadgets can be used to steal our data
  • Suspicious objects such as dongles or USB sticks that are lying around should not be used. Instead, hand them over to IT Support.
  • If you spot people you don't know and don't look like people who work with us, politely ask if you can help and escort them to reception or the person they say they have an appointment with.


Staying on top of intruders

Course module 18 is about how to stop criminals and hackers if they try to sneak into our sites to steal data.

The main points of the course include:

  • Be aware of unexpected visitors
  • Make sure that guests are not travelling alone in the buildings.
  • If you suspect that someone is up to no good, talk to a colleague or manager immediately
  • Check the guest's identity if necessary
  • If there are rules about visible ID cards, make sure that everyone carries their ID cards or guest cards so that they are visible
  • Be aware that dongles and USB sticks can be infected with malware.

The courses are available in different versions, so they can be used in organisations with and without visible ID and guest card rules.

The 'Humour Against Hacking' campaign uses animation along with many other forms of communication.

Learn how and why we use cartoons for cybersecurity

The 'Humour Against Hacking' campaign is targeted and designed for employees in all types of organisations and businesses.

The campaign content includes videos, quizzes, nudging and there is the option to customise all elements.

Learn more about the campaign here