The Mindzeed library
All lessons are aimed at employees and provide basic and valuable knowledge that can be used both in the workplace and in private life. All lessons include a descriptive easy-to-understand animated video and a subsequent test with 5-10 questions.

Phishing emails
Learn about phishing emails and why they are so dangerous to you and your workplace.

Data processing
Data processing is about protecting important information. Learn how to do this in the best possible way.

In the office
Learn how to be security conscious in the office and what you particularly need to look out for when talking about IT security.

Out of the office
IT security is particularly important when you are away from the office because you are no longer protected by the company network. Learn how to protect yourself.

Passwords
Hackers want our passwords so they can steal information or our identities. Learn how to create a secure password and protect yourself and the company.

Social engineering
Social engineering is about manipulating you into providing confidential information. Learn how you can protect yourself against social engineers.

Social Media
Hackers use social media to cheat and deceive us. Learn how to be social on the Internet in a safe way.

Internet security
Learn how to browse the Internet safely and how to avoid hacker attacks, false advertising and infected files.

Mobile devices
We store important information on our laptops, smartphones and tablets, which is why they need to be protected. Learn what you can do.

CEO fraud
Cybercriminals sometimes pretend to be from management and try to trick us into transferring money to a foreign bank account. Learn how to see through the scam.

Ransomware
Learn how to avoid being infected with ransomware which locks your files with a key and requires you to pay ransom to unlock them.

Companies and EU data protection rules
Learn how your organisation ensures compliance with the common European data protection rules.

EU data protection for citizens
Learn about the rights that the European Union’s data protection rules give you as an EU citizen.

Fake News
Fake news, false claims and misinformation thrives like never before. Learn how to see through them and learn how to avoid being involved in spreading fake news.

Email security
Fake news, false claims and misinformation thrives like never before. Learn how to see through them and learn how to avoid being involved in spreading fake news.

IT security culture
Learn why it is important to focus on the IT security culture in the workplace.

10 tips on passwords
Passwords are a large part of information security. So, here are 10 good and useful tips on using passwords

When you work from home
Ten good tips on IT security when you work from home.

Security at video conferencing
Digital communications involve a greater risk of misuse. When we arrange video meetings, we must therefore protect ourselves against intruders.

Who is hacking us?
Mindzeed Mini: Everyone talks about the hackers and the cybercriminals. But who are they? Who is hacking us?

How to spot phishing emails?
Phishing is the most widely used way for cybercriminals to attack us. And even though we can see through many of the fake emails and messages, cybercriminals still manage to cheat us time and time again.

10 tips for cybersecurity
Mindzeed Mini: Ten tips to help increase cybersecurity - delivered in a minute.

Background to the data protection rules
In this lesson you will learn about the background to EU rules on the collection and processing of personal data.

What is personal data?
This lesson provides examples of personal data and how to distinguish between the different types of personal data.

Legal basis
This lesson describes what a processing basis is and what requirements are set in connection with the registration and processing of personal data.

Rights of the data subject
This lesson describes the obligations that companies and organizations - ie data controllers - have towards the private individuals whose data they handle.

Data controller
In this lesson, we talk about the data controller's responsibilities and obligations in connection with the collection and processing of personal data.

Data processor
A data processor is a company that processes personal data on behalf of other companies. In this lesson, we give examples of data processors and tell about responsibilities and obligations.

The role of the Data Protection Adviser
In this lesson, we tell you which companies and organizations should and should have a data protection consultant, and what tasks lie with this one.

Mapping of personal data
In this lesson, we explain how to create an overview of what personal data a company or organization collects and processes.

Risk assessment
What is the probability of a security breach and what will be the consequence? This lesson describes how the company conducts a risk assessment.

Security breach
What is a breach of personal data security and what consequences can it have? In this lesson, we talk about responsibility for securing personal data and what you do in the event of a security breach.

Employees and personal data
Companies and organizations with employees all have personal data. In this lesson, we tell you what personal data is usually collected and how it should be processed.

Consent
When do you need consent to collect and process personal data? And how do you distinguish between the different types?

Personal data and webinars
Learn how to handle personal data collected in connection with hosting a webinar.