This training helps the average user become familiar with a variety of today’s common cyber threats. As they explore, they will gain an understanding of the role they play in keeping their organization safe. They will learn how to spot a cyberattack to protect their organization and themselves.
Duration: 18 minutesIn this training, you will learn some of the latest ways that cybercriminals are targeting you and your organization using social engineering. Kevin Mitnick demonstrates a new spin on a common email trick to show how cybercriminals get information from you and then access your computer as well as the organization's network.
Duration: 14 minutes
Get inside the mind of ex-cybercriminal Una Smith as she explains tailgating and shows the damage that can be done if social engineers gain unauthorised access to an organisation by simply following someone into the building.
Duration: 38 minutes
Test your security knowledge with this jeopardy-style trivia game.
Duration: 16 minutes
In this training, employees will learn what personal information is, about general privacy principles, the types of data that need protection, how to identify threats to data, and what happens when we fail to protect data. This module includes best practices that apply to most privacy regulations (such as GDPR, PIPEDA, CCPA, LGPD, POPIA, and others) and policies, and it uses definitions for privacy and personal information that are broadly applicable.
Duration: 11 minutesCyber criminals know public wifi is vulnerable to attacks and this presents a risk.
Duration: 4 minutes
Social Media are online technologies and platforms where users create content, share their creations and interact with each other globally. How do you stay secure in this environment?
Duration: 8 minutes
How to keep your organisation safe from suspicious and malicious email attacks by using the Phish Alert Button.
Duration: 7 minutes
If your personal interests are at odds with your
responsibility to your organisation, a conflict of interest can arise. Make
sure you and your organisation are familiar with the many ways a conflict of
interest can arise and what to do in the situation.
Duration: 16 minutes
A whopping 81% data breaches uses stolen or weak passwords. This module covers important rules for creating strong passwords, including the latest trend in password security -- the passphrase. You will also discover ways you can keep your passwords secure.
Duration: 10 minutes