Avoiding the Scam! Understanding Your Role in Cybersecurity™

Real World Cybersecurity Situations & Awareness

Cybersecurity is serious business. Millions of dollars are lost each day to cyber crime. Sometimes you hear about it in the news… most of the time you don’t. The four dramatic situations (and information) presented in Avoiding the Scam! tackle the most common gap companies often face in the war against cyber-attacks... the human factor.

Competencies

  • Developing Critical Work Skills
  • Developing High-Performing Work Habits
  • Managing Risk

Learning Objectives

  • Explain the role of cybersecurity in protecting our organization.
  • Understand several types of cyber-attacks and how to identify (and prevent) them.
  • Remember to STOP, THINK and ASK if something looks (or feels) suspicious.

Buying Options

Library License

You may license this resource or the entire video library. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

Streaming License

You may license this resource as a streaming video. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

USB Key (3-Year License) $2,695.00

Secure USB must be seated in computer in order to run. Content can't be copied or downloaded. License fee allows access to content for three years. Any discussion/workshop materials will be delivered via email.
USB Keys: 

Also Available as: eLearning - Classics

Cyber Security Essentials: Stop. Think. Ask.™

Cyber Security Essentials: Stop. Think. Ask.™

Cybersecurity is the practice of protecting systems, networks, programs, devices and data from cyber-attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. By understanding terminology, possible targets and the consequences of cyber-attacks, we can all minimize the potential impacts, gain value in your cybersecurity efforts, and even prevent future attacks.

Training Files (46)

TitleTypeTime/PagesLanguage
Full Video20:14 min EnglishDemo
Avoiding the Scam! Introduction
Video with graphics and narrator
Video Introduction03:34 min EnglishDemo
Avoiding the Scam! Better Act Fast
Video with graphics and narrator
Video Vignette03:56 min EnglishDemo
Avoiding the Scam! I’ve Got a Favor to Ask
Video with graphics and narrator
Video Vignette03:09 min EnglishDemo
Avoiding the Scam! One Bad Transfer
Video with graphics and narrator
Video Vignette03:33 min EnglishDemo
Avoiding the Scam! They Needed My Help
Video with graphics and narrator
Video Vignette03:54 min EnglishDemo
Avoiding the Scam! Program Summary
Video with graphics and narrator
Video Summary01:30 min EnglishDemo
Avoiding the Scam!
Discussion Guide
Workshop Material47 pages EnglishDemo
Avoiding the Scam!
Participant Materials
Workshop Material28 pages EnglishDemo
Avoiding the Scam!
Workshop PowerPoint
Workshop Material23 pages EnglishDemo
Avoiding the Scam!
As Produced Script
Workshop Material20 pages EnglishDemo

Additional Information

Regardless of written policies and procedures, people WILL open emails that look like they are from vendors or customers (only to unleash malware). People WILL share passwords to get a job done on time. People WILL send payment to criminals who use fake letterhead/spoofed (phishing) emails. It’s human nature… and it opens the organization to all sorts of trouble!

"Avoiding the Scam! Understanding Your Role in Cybersecurity™ is exceptionally well done. We love it!" — DirectEmployers Association

The situations presented in this program (as well as the information the fraudster discusses between situations) supplement your company’s technology-facing approach to cybersecurity. They reinforce good habits by showing the true consequences of bad cybersecurity choices. This program provides an overview of the definitions, activities and actions often related to cybersecurity and the prevention of cyber-attacks, including: Promptly reporting potential breaches or suspicious emails; Verifying requests to transfer funds or provide personal identifiable information (PII); Staying alert to potential fraudulent email requests; Following all policies & procedures regarding cybersecurity; Remembering to STOP, THINK and ASK if something looks (or feels) suspicious.


More From the Series: Avoiding the Scam! Understanding Your Role in Cybersecurity™


Related Programs & Training Ideas