Information Classifications
An overview of Information Classifications including, confidential, restricted, internal, and public information.
Risk Management
An overview of Risk Management to identify, protect, detect, respond and recover from potential cyber or physical threats.
Passwords
An overview of Passwords including the use of complex, random, unique passwords, as well as, changing passwords and use of multifactor authentication.
Mobile Devices
An overview of Mobile Device security including backups, keeping applications up to date, and using a VPN.
Be Careful with Information
An overview of Information safety including the
use of public networks, securely disposing of information, encrypting data, as
well as, keeping personal and business information separate.
Social Engineering
An overview of Social Engineering including pretexting, baiting, mind games, and quick tips.
Ransomware
An overview of Ransomware including a short video and knowledge check.
Phishing vs. Spear Phishing
An overview of Phishing versus Spear Phishing including a short video and knowledge check.
Phishing and Emotions
An overview of Phishing and Emotions including a short video and knowledge check.
Vishing
An overview of vishing including pretexting, emotional appeals, priming the recipient, and what you can do to do to avoid the traps.
Malware
An overview of Malware including spyware, ransomware, bots, rootkits, viruses, and more.
Working Outside the Office
An overview of working outside the office including using a VPN, being aware of your surroundings, being prepared for a lost or stolen device, and locking your device.
General Phishing
An overview of General Phishing including a short video and knowledge check.
Phishing
An overview of Phishing including the use of security updates, scanned documents, urgent statements, unpaid invoices, and order confirmation emails.
Brand Impersonation
An overview of brand impersonation including
popular narratives from online shopping, shared documents, social networking,
shipping, and banking.