Search Video Library for: Cybersecurity
Cybersecurity is serious business. Millions of dollars are lost each day to cyber crime. Sometimes you hear about it in the news… most of the time you don’t. The four dramatic situations (and information) presented in Avoiding the Scam! tackle the most common gap companies often face in the war against cyber-attacks... the human factor.
When it comes to cybersecurity, you're only as secure as your employee's knowledge and actions. These easy-to-use cards provide a simple model (S.C.A.M.) along with thought-provoking questions on the importance of understanding and following cybersecurity policies and procedures. These cards are great for a quick training reminder, reinforcement or as a conversation generator.
Fraudsters have a huge toolkit of tricks to pull from. Let's take a case of social engineering – also known as phishing. Hackers can take advantage of the fact that a company is engaged in a merger and/or acquisition, and can target employees who are responsible for personally identifiable information with emails that appeared to be from others within the organization. It happens all the time... especially when policies and procedures are not followed.
Unless we're really careful - and follow our cyber security policies and procedures - emails can get us into real trouble (and lead to serious financial loss). Policies are in place to protect you... and the organization. When it comes to hacks and scams, following those procedures can mean the difference between catching a scam or losing thousands (if not millions) of dollars.
It's important not to skip processes or procedures when dealing with wire transfers, invoice payments and personally identifiable information. It only takes one missed step in the process to cause lots of financial devastation within an organization. And... Never. Ever. Share system passwords with other employees. That's just an big accident waiting to happen!
We all want to help our customers or vendors... but a fake email (or an unconfirmed phone call) can get the organization into some real trouble. It only takes one missed step in the process to cause lots of financial devastation. Cyber attacks are increasing each and every day. If your employees don't know how to spot a bad email - or more importantly - ignore organizational policies and procedures when it comes to security, chances are, you're going to get scammed.
Sensitive information left out on a desk can easily be taken by thieving hands and seen by prying eyes. All sensitive and confidential information should be securely stored – especially things like system passwords. The bottom line is simple. You need to know and follow the organization’s secure/sensitive information policies and procedures – especially when it comes to passwords. Cybersecurity policies are not to be taken lightly.