Avoiding the Scam! One Bad Transfer

Cybersecurity Situations & Awareness

It's important not to skip processes or procedures when dealing with wire transfers, invoice payments and personally identifiable information. It only takes one missed step in the process to cause lots of financial devastation within an organization. And... Never. Ever. Share system passwords with other employees. That's just an big accident waiting to happen!

Learning Paths & Details

Competencies

  • Developing Critical Work Skills
  • Developing High-Performing Work Habits
  • Managing Risk

Buying Options

Library License

You may license this asset or the entire video library. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

Download License $5.00 (Minimum 100 employees)

This license option grants access to the full (complete) video - downloaded in MP4 format.
Employees: 

USB Key (1 Year License) $595.00

Secure USB must be seated in computer in order to run. Content can't be copied or downloaded. Purchase price allows access to content for one year. Discussion/workshop materials (when applicable) will be delivered via email.
USB Keys: 

USB Key (2 Year License) $1,100.75

Discussion/workshop materials (when applicable) will be delivered via email.
USB Keys: 

USB Key (3 Year License) $1,576.75

Discussion/workshop materials (when applicable) will be delivered via email.
USB Keys: 

Training Files (8)

TitleTypeTime/PagesLanguage
Avoiding the Scam! One Bad Transfer
Video with graphics and narrator
Video Vignette03:33 minEnglishDemo
Workshop Material4 pagesEnglishDemo
Avoiding the Scam! One Bad Transfer
Video Discussion Questions
Workshop Material2 pagesEnglishDemo

Additional Information

When it comes to beating scammers and fraudster in the cyber attack game, there are some key actions you should always follow:

  • Restrict computer use to work-related functions to avoid the chance of receiving or opening a phishing email.
  • Avoid clicking on links in emails from unknown senders, or in emails that are suspicious.
  • Don’t share system passwords. Ever!
  • Follow all processes and procedures – especially those that include wire transfers and monetary transactions.

More From the Series: Avoiding the Scam! Understanding Your Role in Cybersecurity™


Related Programs & Training Ideas