Course Category: courseformat::video

  • Lock Before You Walk - Home VPN Security

    About this video training: With so many of us working from home, we must be extra security-conscious in order to protect our organization and ourselves from potential threats. Make sure your work devices are either shut down or locked if you need to leave them unattended for any reason. Never allow anyone else to use […]

  • Homephished - Spearphishing while WFH

    About this video training: Working from home might increase the risk of online security and privacy… Be careful with your personal information, as it can open the door to a whole new level of criminal activity. Please complete this training as soon as possible. We hope you enjoy!

  • GPS Distress - Man in the middle

    About this video training: A “man in the middle”, or “MITM” attack is when a hacker gains access to a conversation between a user and an application to steal personal information. Please complete this training as soon as possible. We hope you enjoy!

  • Smishing - Frank's Smish

    About this video training: A hack known as “Blueleaks” recently exposed an enormous amount of highly sensitive law enforcement data. Including the personal information of over 700.000 police professionals. Please complete this training as soon as possible. We hope you enjoy!

  • 401 Chaos - Email account takeover

    About this video training: The National Association of Plan Advisors sated that the number of retirement account hacks has seen an increase of 300% in recent years. Cybercrooks are targeting retirement accounts. Learn how to help prevent 401k fraud. Please complete this training as soon as possible. We hope you enjoy!

  • Charity Case

    About this video training: Scammers and hackers leverage mayor disasters, such as COVID-19, to trick victims who have let their guard down during emotional times. Always scrutinize an organization that’s asking for donations or help with managing donations . Please complete this training as soon as possible. We hope you enjoy!

  • A compromising crash - BEC cyberattack

    About this video training: Make sure to verify the source of sensitive request by phone or in person, even if it looks like a legitimate message. An attacker can use your email account to send messages that can compromise your organization. Please complete this training as soon as possible. We hope you enjoy!

  • Passphrase For Days

    About this video training: Use a passphrase to create stronger passwords and make sure that is truly secure. The number of characters is more important than complexity, when it comes to passwords. Please complete this training as soon as possible. We hope you enjoy!

  • Hook Line and Spoofer - Telephone Scams

    About this video training: 70 percent of fraud attempts are made by phone call. Almost one-in-five people targeted by imposter callers will fall for the scam, losing money. Please complete this training as soon as possible. We hope you enjoy!

  • Plug and Pay - Ramsomware

    About this video training: USB charging cables can be modified by hackers to launch malicious code and transfer Ransomware, which is a type of Malware. Avoid the use of free, public, promotional, or off-brand cables purchased online. Please complete this training as soon as possible. We hope you enjoy!