The Cybersecurity Series on Cyber Safety is divided into 3 parts: Beginner, Intermediate, and Advanced.
Beginner modules cover the basics of what every team member needs to know. The intermediate modules build on those beginner concepts, and advanced modules touch on more technical topics.
We strongly recommend that all team members (full time and part time) partake in all Cybersecurity Series courses.
- Security at Home
This course identifies crucial actions for working securely at home, which is important for mobile and remote workers.
- Cloud Security
A crash course in the business benefits and security drawbacks of cloud computing services and platforms.
- Secure Internet Use
We use email and internet technologies daily to conduct business, so it’s essential to keep security in mind when doing so.
- Mobile Device Security
This course covers specific concerns for the mobile devices which are increasingly a part of our work lives.
Since it’s now easier to trick somebody into giving you access than hacking your way in, it’s essential to train your users to spot & avoid such attempts.
- Physical Security
This course details how physical security measures are required to protect data and information systems.
- Public Wi-Fi
It’s convenient but not a secure option: how to use and ensure you stay secure on public Wi-Fi.
- Removable Media
When data goes portable it needs additional protections: how to keep data on removable devices confidential.
- Secure Passwords & Authentication
Secure credentials are a requirement, and this course highlights best practices for password security and measures like 2- or multi-factor authentication (2FA and MFA).
- Social Engineering
Similar to phishing, social engineering exploits human weaknesses, and this course helps your users spot and avoid such attacks.
- Using Social Media Safely
Details posted on social media can often lead to social engineering attacks or, at worst, data breaches; this course highlights best practices for using social media in a company setting.
- Working Remotely
Tips and best practices for workers who don’t work in a company-controlled space, including additional elements of mobile device security, public Wi-Fi, and physical security.
Ransomware attacks can be highly damaging to businesses. Learn what ransomware is, how it spreads, and how to help prevent it from affecting your company.
What Makes a Cyber Criminal?
Cyber criminals aren’t just hooded villains typing away in dark basements. Learn about what motivates cyber criminals - and how this knowledge can help you stay secure.
The Internet of Things
The Internet of Things is a growing network of connected smart devices. Learn why there are security risks associated with the Internet of Things, and what you can do to keep your devices and data secure.
The Insider Threat
What is the Insider Threat, and how can you protect your organization? Learn about the different types of insider attack and how you can counter them.
Information & Data
What is the difference between information and data? Learn how to tell the two apart, and how to protect sensitive information in your organization.
What is smishing, and how do you protect yourself and your data from it? Learn the essentials of combating text-message-based scams.
Secure Email Use
While email is an essential tool in any workplace, there are a number of security risks associated with its use. Learn how to use email securely at work.
What security risks are associated with online calls and videoconferences, and how can you stay safe? Learn the essentials of safely meeting online.
What is data loss, why should you be concerned about it, and how can you prevent it? Learn about the ramifications of data loss now.
Denial of Service Attacks (DoS)
What are Denial of Service attacks, why might they target your organization, and how do you protect yourself against them? Learn the essentials of DoS attacks.
Patching & Updating
Regularly downloading and installing updates is one of the keys to secure computing. But why exactly are updates so important - and do they really have to be released so often? Learn all you need to know about patching and updating in this course.
Scammers use phone calls and voice-mail messages to dupe employees into giving up sensitive information. Learn what vishing scams are, how they work, and how to identify and stop them.
Spyware & Adware
What are spyware and adware, what impact can they have on your devices and data, and how can you protect yourself from infection?
The Dark Web
What is the dark web, is it illegal, and how can you protect yourself when accessing it?
Protecting Your Online Privacy
Why does online privacy matter, why do criminals care about your data, and how can your privacy become compromised?
What does BYOD mean, what security risks does it involve, and how can you help keep data safe when working from personal devices?
Secure VPN Use
How does a VPN help you secure your connection, when should you use one, and how can you ensure you're using your VPN safely?
File Sharing in the Workplace
How can files be shared, what security risks are involved, and how can you keep data and devices safe?
Home Network Security
Why do you need to protect your home network, and what threats are there?
Clear Desk Policy
What does a Clear Desk Policy involve, and what threats does it help counter?
What security risks come with online payments, and how do you keep them secure?
Malicious Websites & Applications
What type of malicious websites and applications are there, and what are the risks?
What types of malware are there, how can you become infected and what damage can they cause? Learn how to protect your data, devices and organization from malware.
Using Third Party Services Securely
What risks can third-party services pose to data security, and how can you help mitigate the impact of breaches?
Additional Cybersecurity Courses
In addition to the core Cybersecurity Series, we offer the following courses that you can assign to relevant team members.
Coronavirus Phishing (US)
Cybercriminals are exploiting the coronavirus outbreak with phishing emails. This course will show you how to stay safe from COVID-19 phishing scams.
Protecting Corporate Social Media Accounts
How can corporate social media accounts become compromised, and why can it be so damaging? Learn how to protect your company's social media profiles.
Return to Office: Essential Security Awareness
While working from the office gives you better access to the IT support team, it is important to stay aware of the security risks. Learn what security threats you should be on the lookout for when returning to your workplace, and how to keep your data and devices protected.
The Importance of VPNs
What exactly is a VPN, how do they work, and why should you use one? Learn all the essentials of Virtual Private Network use.