An overview of Information Classifications
including, confidential, restricted, internal, and public information.
An overview of Risk Management to identify,
protect, detect, respond and recover from potential cyber or physical threats.
An overview of Passwords including the use
of complex, random, unique passwords, as well as, changing passwords and use of
An overview of Mobile Device security
including backups, keeping applications up to date, and using a VPN.
An overview of Information safety including the
use of public networks, securely disposing of information, encrypting data, as
well as, keeping personal and business information separate.
An overview of Social Engineering including
pretexting, baiting, mind games, and quick tips.
An overview of Ransomware including a short
video and knowledge check.
An overview of Phishing versus Spear
Phishing including a short video and knowledge check.
An overview of Phishing and Emotions including
a short video and knowledge check.
An overview of vishing including
pretexting, emotional appeals, priming the recipient, and what you can do to do
to avoid the traps.
An overview of Malware including spyware,
ransomware, bots, rootkits, viruses, and more.
An overview of working outside the office
including using a VPN, being aware of your surroundings, being prepared for a
lost or stolen device, and locking your device.
An overview of General Phishing including a
short video and knowledge check.
An overview of Phishing including the use
of security updates, scanned documents, urgent statements, unpaid invoices, and
order confirmation emails.
An overview of brand impersonation including
popular narratives from online shopping, shared documents, social networking,
shipping, and banking.