Coronaviruses are a large group of viruses that can cause illnesses ranging...
MORE INFOCoronaviruses are a large group of viruses that can cause illnesses ranging from the common cold to more severe diseases. This safety short examines the various ways in which Coronaviruses can be spread.
RUNNING TIME: 1 Minute
Coronaviruses are a large group of viruses that can cause illnesses ranging...
MORE INFOCoronaviruses are a large group of viruses that can cause illnesses ranging from the common cold to more severe diseases such as Middle East Respiratory Syndrome (MERS) and Severe Acute Respiratory Syndrome (SARS).
As a family, coronaviruses are common across the globe. Recently, a new strain of coronavirus was discovered that has not previously been identified in humans. This new coronavirus, sometimes referred to as the novel coronavirus, leads to Coronavirus disease, also known as COVID-19.
This program covers:
The objective of this program is to increase awareness of Coronaviruses in general, and COVID-19 more specifically, and by so doing, increase awareness of the standards for worker responsibility in observing and being active in daily safety procedures.
Following procedures that have been laid down will go a long way to protect you from infection.
RUNNING TIME: 10 Minutes
As a family, coronaviruses are common across the globe. This safety short...
MORE INFOAs a family, coronaviruses are common across the globe. This safety short outlines some of the control measures that can be taken to prevent their spread.
RUNNING TIME: 2 Minutes
We live in a digital world, and many of the threats that we face, in our...
MORE INFOWe live in a digital world, and many of the threats that we face, in our lives and at work, are now digital ones.
Cyber threats are a major issue for organizations, with the possibility of data breaches, financial loss and loss of valuable information.
The most common threats are:
This program will cover the types of cybersecurity threats and how best to identify them.
RUNNING TIME: 10 Minutes
A particularly dangerous form of cybersecurity risk is that of insider...
MORE INFOA particularly dangerous form of cybersecurity risk is that of insider threats.
These are cyber threats that originate from within the organization which makes them especially difficult to detect and deal with.
Because an insider threat does not need to go through the process of gaining access to the system – as they’re already inside – they are often capable of going undetected for longer, and doing more damage, than external threats.
RUNNING TIME: 2 Minutes
Malware is software created and deployed to compromise or disrupt computer...
MORE INFOMalware is software created and deployed to compromise or disrupt computer systems. The consequences of a system becoming infected with malware can be devastating, including the breakdown of normal operations, the accessing of sensitive information by criminal actors, disruption to business and financial loss.
Any professional computer system should have malware protection set up, but there are also ways in which an individual can identify the possibility of malware, allowing them to take steps to prevent damage.
RUNNING TIME: 2 Minutes
Phishing is a type of social engineering – the practice of manipulating...
MORE INFOPhishing is a type of social engineering – the practice of manipulating people into giving up valuable information.
Signs to look out for to avoid phishing scams include:
RUNNING TIME: 3 Minutes
One specific and very damaging type of malware is ransomware. This is...
MORE INFOOne specific and very damaging type of malware is ransomware. This is software that infiltrates a system and stops it working, by locking or encrypting files to prevent access to them. The user of the ransomware will then demand a payment to unlock the system.
RUNNING TIME: 2 Minutes
Passwords are the first line of defense against hackers and scammers. Your...
MORE INFOPasswords are the first line of defense against hackers and scammers.
Your passwords should be strong and unique. Do not use anything that would be easy for someone who knows you to guess as your password. Use a mixture of letters, numbers, and symbols.
Ensure all physical documents and data are securely stored in a desk - preferably locked or appropriately destroyed and disposed of at the end of a work session.
RUNNING TIME: 3 Minutes
Browsing the internet is one of the main sources of danger when it comes to...
MORE INFOBrowsing the internet is one of the main sources of danger when it comes to your devices. It is a constant exchange of data through uploading and downloading with the website you are visiting.
When you’re using social media, it’s important to always be aware of what your social media presence might be exposing you to.
Public networks can be a major threat to maintaining digital hygiene as it can leave your devices vulnerable to threats from others connected to the same network.
RUNNING TIME: 4 Minutes
As programs that are not updated are more vulnerable to threats, old and...
MORE INFOAs programs that are not updated are more vulnerable to threats, old and unused software and apps should be deleted from your computer or device.
Often software providers will release updates or patches that have been created to address security weaknesses that have recently been identified.
Antivirus and Anti-malware software is also very important for digital systems.
RUNNING TIME: 2 Minutes
Most organizations will have a person, department, or contractor that is...
MORE INFOMost organizations will have a person, department, or contractor that is responsible for the management of computers and digital systems in an organization.
Some of the practical steps outlined in this program may be managed entirely by such a department. Regardless, a basic understanding helps you be a first line of defense for your organization, and you can apply these learnings when using your personal devices, computers, and systems to help keep yourself safe whenever you’re online.
RUNNING TIME: 2 Minutes
One of the best ways to defend against digital threats like computer...
MORE INFOOne of the best ways to defend against digital threats like computer viruses, software bugs, data loss and privacy breaches is through the regular practice of Digital Hygiene.
Digital Hygiene is about learning habits and practices to keep your systems and information secure.
Examples of Digital Hygiene include:
RUNNING TIME: 13 Minutes
All workplaces make use of some sort of Display Screen Equipment. Display...
MORE INFOAll workplaces make use of some sort of Display Screen Equipment. Display Screen Equipment, sometimes referred to as DSE, is any device, or piece of equipment that has an alphanumeric or graphic display screen.
Equipment categorized as display screen equipment include:
Tasks requiring prolonged use of display screen equipment can present real hazards to users. Use of that equipment requires proper management to control the hazards and reduce the risks to DSE users.
This program aims to raise awareness of DSE issues in the workplace. By paying close attention to the requirements of the job and the design of the workplace, the threat to individuals’ health and safety at work can be made as small, and the workplace experience made as comfortable, as possible.
RUNNING TIME: 12 Minutes
Ergonomics is the study of the relationship between people, the equipment...
MORE INFOErgonomics is the study of the relationship between people, the equipment they use and the physical environment in which they work.
Ergonomics is about the application of the knowledge of this relationship to benefit well-being, performance and improve both short and long term health and safety.
Subjects covered in the program include:
Compromises and often small improvement are the hallmarks of almost every organization's commitment to ergonomics - however, long term results can be dramatic.
Applied properly, ergonomic principles will improve productivity, morale, health and safety.
This program is suitable for all in the workforce for an introduction to ergonomics and to reinforce the principles that must be employed when addressing ergonomic problems.
RUNNING TIME: 9 Minutes
Face Masks are an effective control measure that can be used to control the...
MORE INFOFace Masks are an effective control measure that can be used to control the spread of Coronaviruses. This safety short gives a quick overview of common mask types and how to use them correctly.
RUNNING TIME: 4 Minutes