Intro to Phish Threat
About this training: This is an informative training to describe what Phish Threat is and why your organization is using it. Please complete this training as soon as possible. We hope you enjoy!
About this training: This is an informative training to describe what Phish Threat is and why your organization is using it. Please complete this training as soon as possible. We hope you enjoy!
About this training: Oh no! A local business, Hacme Bank, has experienced a breach! They need your help to find out how the breach occurred. For this training, you are stepping into the shoes of famous cybercrime investigator, Detective McLane, to help Hacme Bank get to the bottom of this breach. Good luck, Detective! Please […]
Preview this course - (1 preview lessons)
About this training: Remember, even if an email appears to come from a legitimate source, it could still be a phishing attempt. This brief training will show you an effective way of spotting a phish by taking a moment to look at where links in the email will actually take you. Please complete this training […]
About this training: The Health Insurance Portability and Accountability Act (HIPAA) provides for the protection of individually identifiable health information that is transmitted or maintained in any form or medium. The privacy rules affect the day-to-day business operations of healthcare providers, health plans, healthcare clearing houses, and other similar organizations. This easy-to-follow interactive training will […]
About this training: The prevalence of phishing and email fraud has made people wary of giving out personal information online. Mistakenly, we trust phone numbers and SMS messages because we don’t think fraudsters will bother with the effort and cost needed to set them up. Unfortunately, it’s much easier than you may think to use […]
About this training: With so many users, Facebook, LinkedIn, Twitter, and other social media sites are a major target for scammers. Scams on or related to social media include phishing, cross-site scripting, clickjacking, survey scams and identity theft. Many also tap into our interest in the news, holiday activities, and other topical events to get […]
About this training: Virtually every organization acquires, uses and stores personally identifiable information (PII). Most have it for their employees and, depending on their area of business, may also have it for a wider group including customers, patients, residents and students. Organizations are expected to manage this private data appropriately and take every precaution to […]
About this training: Did you know that for less than $20,000 you could build your very own password cracker that, under ideal conditions, could try out more than 100,000,000,000 passwords EVERY SECOND? That means you could churn through every possible 8-letter password in just 2 seconds, and every 9-letter password in under a minute! Needless […]
Preview this course - (1 preview lessons)