Course Category: courseduration::4

  • GPS Distress - Man in the middle

    About this video training: A “man in the middle”, or “MITM” attack is when a hacker gains access to a conversation between a user and an application to steal personal information. Please complete this training as soon as possible. We hope you enjoy!

  • Smishing - Frank's Smish

    About this video training: A hack known as “Blueleaks” recently exposed an enormous amount of highly sensitive law enforcement data. Including the personal information of over 700.000 police professionals. Please complete this training as soon as possible. We hope you enjoy!

  • 401 Chaos - Email account takeover

    About this video training: The National Association of Plan Advisors sated that the number of retirement account hacks has seen an increase of 300% in recent years. Cybercrooks are targeting retirement accounts. Learn how to help prevent 401k fraud. Please complete this training as soon as possible. We hope you enjoy!

  • Charity Case

    About this video training: Scammers and hackers leverage mayor disasters, such as COVID-19, to trick victims who have let their guard down during emotional times. Always scrutinize an organization that’s asking for donations or help with managing donations . Please complete this training as soon as possible. We hope you enjoy!

  • A compromising crash - BEC cyberattack

    About this video training: Make sure to verify the source of sensitive request by phone or in person, even if it looks like a legitimate message. An attacker can use your email account to send messages that can compromise your organization. Please complete this training as soon as possible. We hope you enjoy!

  • Passphrase For Days

    About this video training: Use a passphrase to create stronger passwords and make sure that is truly secure. The number of characters is more important than complexity, when it comes to passwords. Please complete this training as soon as possible. We hope you enjoy!

  • Hook Line and Spoofer - Telephone Scams

    About this video training: 70 percent of fraud attempts are made by phone call. Almost one-in-five people targeted by imposter callers will fall for the scam, losing money. Please complete this training as soon as possible. We hope you enjoy!

  • Plug and Pay - Ramsomware

    About this video training: USB charging cables can be modified by hackers to launch malicious code and transfer Ransomware, which is a type of Malware. Avoid the use of free, public, promotional, or off-brand cables purchased online. Please complete this training as soon as possible. We hope you enjoy!

  • Disregard the Gift Card

    About this video training: When receiving financial requests over email or text message, it’s always best to verify before acting by speaking directly with the person who made the request. Scrutinize urgent written requests closely, as scammers use this tactic to increase their chance of tricking their victims. Please complete this training as soon as […]

  • Malicious USB Drop Attacks

    About this video training: The uncontrolled use of removable media can compromise your organization and increase the risk of malicious attacks. If you find a random USB stick laying around somewhere, it could be an actual attack vector. Please complete this training as soon as possible. We hope you enjoy!