Back
Cyber Security Training & Software for Companies | MetaCompliance

Products

Discover our suite of personalised Security Awareness Training solutions, designed to empower and educate your team against modern cyber threats. From policy management to phishing simulations, our platform equips your workforce with the knowledge and skills needed to safeguard your organisation.

Cyber Security eLearning

Cyber Security eLearning to Explore our Award-Winning eLearning Library, Tailored for Every Department

Security Awareness Automation

Schedule Your Annual Awareness Campaign In A Few Clicks

Phishing Simulation

Stop Phishing Attacks In Their Tracks With Award-Winning Phishing Software

Policy Management

Centralise Your Policies In One Place And Effortlessly Manage Policy Lifecycles

Privacy Management

Control, Monitor, and Manage Compliance with Ease

Incident Management

Take Control Of Internal Incidents And Remediate What Matters

Back
Industry

Industries

Explore the versatility of our solutions across diverse industries. From the dynamic tech sector to healthcare, delve into how our solutions are making waves across multiple sectors. 


Financial Services

Creating A First Line Of Defence For Financial Service Organisations

Governments

A Go-To Security Awareness Solution For Governments

Enterprises

A Security Awareness Training Solution For Large Enterprises

Remote Workers

Embed A Culture Of Security Awareness - Even At Home

Education Sector

Engaging Security Awareness Training For The Education Sector

Healthcare Workers

See Our Tailored Security Awareness For Healthcare Workers

Tech Industry

Transforming Security Awareness Training In The Tech Industry

NIS2 Compliance

Support Your Nis2 Compliance Requirements With Cyber Security Awareness Initiatives

Back
Resources

Resources

From posters and policies to ultimate guides and case studies, our free awareness assets can be used to help improve cyber security awareness within your organisation.

Cyber Security Awareness For Dummies

An Indispensable Resource For Creating A Culture Of Cyber Awareness

Dummies Guide To Cyber Security Elearning

The Ultimate Guide To Implementing Effective Cyber Security Elearning

Ultimate Guide To Phishing

Educate Employees About How To Detect And Prevent Phishing Attacks

Free Awareness Posters

Download These Complimentary Posters To Enhance Employee Vigilance

Anti Phishing Policy

Create A Security-Conscious Culture And Promote Awareness Of Cyber Security Threats

Case Studies

Hear How We’re Helping Our Customers Drive Positive Behaviour In Their Organisations

A-Z Cyber Security Terminology

A Glossary Of Must-Know Cyber Security Terms

Cyber Security Behavioural Maturity Model

Audit Your Awareness Training And Benchmark Your Organisation Against Best Practice

Free Stuff

Download Our Free Awareness Assets To Improve Cyber Security Awareness In Your Organisation

Back
MetaCompliance | Cyber Security Training & Software for Employees

About

With 18+ years of experience in the Cyber Security and Compliance market, MetaCompliance provides an innovative solution for staff information security awareness and incident management automation. The MetaCompliance platform was created to meet customer needs for a single, comprehensive solution to manage the people risks surrounding Cyber Security, Data Protection and Compliance.

Why Choose Us

Learn Why Metacompliance Is The Trusted Partner For Security Awareness Training

Employee Engagement Specialists

We Make It Easier To Engage Employees And Create a Culture of Cyber Awareness

Security Awareness Automation

Easily Automate Security Awareness Training, Phishing And Policies In Minutes

Leadership

Meet the MetaCompliance Leadership Team

MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

3 biggest security mistakes made at the office

blog-main-image-01

about the author

Share this post

3 biggest security mistakes made at the office

What is tailgating?

Often known as ‘piggybacking’, it starts out innocently – an employee holding a door open for others (visitors without badges, or someone in uniform appearing to be a worker.) It may seem like a harmless gesture and probably something you do without thinking twice about it, but tailgating is one of the most common security breaches that can happen in your office. 

It’s easy to assume this individual is an employee or a contractor and this is the reason these attempted breaches are often successful. Fraudsters know that it will make employees uncomfortable to confront strangers or deny them access, especially if it’s a large organisation with part time staff or contractors. But it’s important to be aware of your surroundings and question anything you find suspicious because the shocking reality is that crime can be committed by someone you didn’t even know was in your building.  

If a fraudster gains access, their intent is usually to steal hardware or information by gaining access to the company’s internal systems. This could be diabolical to your organisations reputation which is much worse than simply asking to see someone’s ID or to sign into the building.  

What can you do to prevent tailgating? 

Your role is to ensure only authorised personnel can access the premises. It’s important that you don’t let anyone into your building who doesn’t have authorised access by remaining alert and challenging a suspected tailgater when necessary. 

– Always be aware of anyone following you through a door. Politely greet them and escort them to their correct location. 

– Have appropriate procedures for anyone who works in your building. (Electronic passes/ identification cards for employees, sign guests in and out.) 

– Don’t hold the door for anyone and don’t expect them to hold the door for you.

Watch our eLearning tailgating trailer here to see if you could spot a tailgater.  

3 biggest security mistakes made at the office

Having an ‘untidy’ desk doesn’t necessarily mean the leftover wrappers from lunch. The other things you have laying around your desk such as passwords scribbled on sticky notes, login details left in notepads, important client information stored away in an unlocked drawer – these are also features of an ‘untidy desk’ and much more damaging to you and your businesses reputation. Ask yourself: How valuable is this information I hold? And how can I protect it? 

– Always lock your computer before you leave your seat. An unlocked computer means that anyone can gain access to important information and files. 

– Never EVER write your passwords down or share them with anyone else. Keep them out of sight in a secure location and remember to change them regularly. 

– Any information you have on paper, keep it locked away in a secure location and if you no longer need it, shred it.  

Everyone seems to believe that the information they hold isn’t valuable, but that couldn’t be further from the truth. The information you hold could be all a fraudster needs to gain access to confidential information. Always keep a clear desk and don’t leave anything laying around for a criminal to steal.  

3 biggest security mistakes made at the office

One of the biggest mistakes you can make in the office is not backing up your work. This might seem obvious to save your work regularly, but have you thought about where you should save it and how often? Being conscious of this will be beneficial if you’re ever faced with a ransomware attack or an unexpected computer crash. 

– Always work from a shared network in the event that you are the victim of a ransomware attack. You will then have peace of mind knowing all your important documents are safe.

– Never completely rely on your computer. All technology can malfunction now and then, so make sure to regularly save your work as you go to avoid losing an important project or report. You should be saving your work often throughout the day so if the worst were to happen you’d have the latest version. 

Read more:

5 Benefits of eLearning for your Employees

The Dangers of Tailgating in the Workplace

7 Cyber Habits for Mid-Sized Organisations

Other Articles on Cyber Security Awareness Training You Might Find Interesting