Avoiding the Scam! They Needed My Help

Cybersecurity Situations & Awareness

We all want to help our customers or vendors... but a fake email (or an unconfirmed phone call) can get the organization into some real trouble. It only takes one missed step in the process to cause lots of financial devastation. Cyber attacks are increasing each and every day. If your employees don't know how to spot a bad email - or more importantly - ignore organizational policies and procedures when it comes to security, chances are, you're going to get scammed.

Learning Paths & Details

Competencies

  • Developing Critical Work Skills
  • Developing High-Performing Work Habits
  • Managing Risk

Buying Options

Library License

You may license this asset or the entire video library. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

Download License $5.00 (Minimum 100 employees)

This license option grants access to the full (complete) video - downloaded in MP4 format.
Employees: 

USB Key (1 Year License) $595.00

Secure USB must be seated in computer in order to run. Content can't be copied or downloaded. Purchase price allows access to content for one year. Discussion/workshop materials (when applicable) will be delivered via email.
USB Keys: 

USB Key (2 Year License) $1,100.75

Discussion/workshop materials (when applicable) will be delivered via email.
USB Keys: 

USB Key (3 Year License) $1,576.75

Discussion/workshop materials (when applicable) will be delivered via email.
USB Keys: 

Training Files (8)

TitleTypeTime/PagesLanguage
Avoiding the Scam! They Needed My Help
Video with graphics and narrator
Video Vignette03:54 min EnglishDemo
Workshop Material4 pages EnglishDemo
Avoiding the Scam! They Needed My Help
Video Discussion Questions
Workshop Material2 pages EnglishDemo

Additional Information

When it comes to beating cyber criminals:

  • Do not take shortcuts on processes that are in place to confirm the identity of approved and existing vendors.
  • When employees are involved with the transfer of funds, employees should always take the extra step of verifying that the request is legitimate by making a phone call to verify a request.
  • The phone call should not be to a phone number provided in an email request, since fraudsters will likely substitute a phony number, but to a phone number the company already has on file.

More From the Series: Avoiding the Scam! Understanding Your Role in Cybersecurity™


Related Programs & Training Ideas