Courses

  • Hook Line and Spoofer - Telephone Scams

    About this video training: 70 percent of fraud attempts are made by phone call. Almost one-in-five people targeted by imposter callers will fall for the scam, losing money. Please complete this training as soon as possible. We hope you enjoy!

  • Plug and Pay - Ramsomware

    About this video training: USB charging cables can be modified by hackers to launch malicious code and transfer Ransomware, which is a type of Malware. Avoid the use of free, public, promotional, or off-brand cables purchased online. Please complete this training as soon as possible. We hope you enjoy!

  • Disregard the Gift Card

    About this video training: When receiving financial requests over email or text message, it’s always best to verify before acting by speaking directly with the person who made the request. Scrutinize urgent written requests closely, as scammers use this tactic to increase their chance of tricking their victims. Please complete this training as soon as […]

  • Voicemail Fail

    About this video training: If you click on a voice attachment that doesn’t open an audio player, check your company guidelines to report it to the appropriate resources. Inspect e-mails that contain attachments with extra scrutiny. Be mindful of anomalies such as attachment type, spelling or grammatical errors. Please complete this training as soon as […]

  • Malicious USB Drop Attacks

    About this video training: The uncontrolled use of removable media can compromise your organization and increase the risk of malicious attacks. If you find a random USB stick laying around somewhere, it could be an actual attack vector. Please complete this training as soon as possible. We hope you enjoy!

  • SIM card hijacking

    About this video training: SIM card hijacking can be used to bypass Two Factor Authentication (2FA). It’s a hacking method that reassigns your phone number to a different SIM card. Most cellular service providers can implement additional security measures to prevent your SIM cards from being highjacked. Please complete this training as soon as possible. […]

  • Blame Game

    About this video training: Data breaches can be dangerous and damaging to brand reputations. Human behavior is the most common cause of a breach, and it could be caused by an employee of any level. Follow your organizations policies regarding the use of personal media devices at work. Please complete this training as soon as […]

  • Fake Profile Friend Request

    About this video training: Users of online services have fallen victim to a scam that’s cost some members thousands of dollars. Hackers can use Social Media to attack end users. We recommend only accepting friend requests from people that you already know. Please complete this training as soon as possible. We hope you enjoy it!

  • Password Spraying

    About this video training: Password spraying is a technique used by hackers to guess users’ passwords by attempting to log into their accounts with commonly used passwords, such as,”password1″. A secure method for password creation is to use a combination of letters, numbers and special characters. It’s also important to remember to not use the […]

  • Cracked E-mail Extortion

    About this video training: Recently, e-mails have been going around where a “hacker” claims to have “cracked your devices”, and also to have been watching you through your computer’s webcam. Most of these claims turn out to be bluffs on the part of the “hacker” in an attempt to scare you into doing what they […]