Avoiding the Scam! Understanding Your Role in Cybersecurity™
Real World Cybersecurity Situations & Awareness
Cybersecurity is serious business. Millions of dollars are lost each day to cyber crime. Sometimes you hear about it in the news… most of the time you don’t. The four dramatic situations (and information) presented in Avoiding the Scam! tackle the most common gap companies often face in the war against cyber-attacks... the human factor.
Learning Paths & Details
- Ethics & Compliance
- Personal Performance
- Type: Off-The-Shelf Video Program (ILT)
- Audience: General
- Available As: Download, USB, USB-2YR, USB-3YR
Suggested Industry Usage
- Developing Critical Work Skills
- Developing High-Performing Work Habits
- Managing Risk
- Explain the role of cybersecurity in protecting our organization.
- Understand several types of cyber-attacks and how to identify (and prevent) them.
- Remember to STOP, THINK and ASK if something looks (or feels) suspicious.
Training Files (46)
|Full Video||20:14 min||English||Demo|
|Video Introduction||03:34 min||English||Demo|
|Video Vignette||03:56 min||English||Demo|
|Video Vignette||03:09 min||English||Demo|
|Video Vignette||03:33 min||English||Demo|
|Video Vignette||03:54 min||English||Demo|
|Video Summary||01:30 min||English||Demo|
|Workshop Material||47 pages||English||Demo|
|Workshop Material||28 pages||English||Demo|
|Workshop Material||23 pages||English||Demo|
|Workshop Material||20 pages||English||Demo|
Regardless of written policies and procedures, people WILL open emails that look like they are from vendors or customers (only to unleash malware). People WILL share passwords to get a job done on time. People WILL send payment to criminals who use fake letterhead/spoofed (phishing) emails. It’s human nature… and it opens the organization to all sorts of trouble!
The situations presented in this program (as well as the information the fraudster discusses between situations) supplement your company’s technology-facing approach to cybersecurity. They reinforce good habits by showing the true consequences of bad cybersecurity choices. This program provides an overview of the definitions, activities and actions often related to cybersecurity and the prevention of cyber-attacks, including: Promptly reporting potential breaches or suspicious emails; Verifying requests to transfer funds or provide personal identifiable information (PII); Staying alert to potential fraudulent email requests; Following all policies & procedures regarding cybersecurity; Remembering to STOP, THINK and ASK if something looks (or feels) suspicious.