Register Now For Our One-Hour Cybersecurity Course

"85% of breaches involved a human element"

(Verizon 2021 Data Breach Investigations Report)

A single click can lead to a multimillion dollar breach in seconds, and the employee responsible may not even know they made a mistake. Many end users are not aware of the dangers accompanying today’s most common cybersecurity threats such as phishing, much less how to detect them. CyberSAFE helps ensure that all users can identify the common risks associated with using conventional end-user technology, as well as how to safely protect themselves and their organizations from security risks in the office or when working remotely. 

"81% of organizations around the world have experienced an increase in email phishing attacks since March 2020"

(IRONSCALES)

In This Class, You Will Learn...

 The importance of cybersecurity policies
Identify requirements and resources for three crucial areas of compliance: security compliance, legal compliance, and industry-specific compliance. 
How to recognize attacks, what common attack vectors are used, the different types of attacks (phishing, pharming, impersonation, etc.), and how to defend against these attacks.
The different types of malware—viruses, worms, adware, spyware, Trojan horses, and more
The sources of malware, the effects once a device is exposed, and guidelines for defending against malware 
What an AUP is and how it protects yourself and your organization.
Different types of PII, and knowing what PII looks like and how a security policy is designed to protect it from exposure.
What are protected data types (Social Security numbers, driver’s license numbers, etc.) and the general requirements for protecting this type of data.
Password strength, proper password management, and protecting your screen when authenticating
How to use secure authentication methods, how to protect standard and sensitive data and how to use wireless devices securely.
How to identify emails from untrusted sources and how to handle them safely
How to surf and use the web safely, including how to recognize poorly formed or suspicious URLs 
The proper management of a personal cell phone when using it for work, paying close attention to permissions granted to applications such as calendars, cameras, contact lists, Location Services, microphones, and text messaging
Risks associated with connecting personal Bluetooth devices to company assets, with the biggest risk being leaving a company asset in a “Bluetooth discoverable state,” and teaching the correct way to allow for a connection and to turn off discovery.

Register For An Upcoming Class

Each class is one hour long and starts at 11:00am ET

Questions?

If you have any questions or run into any issues, please do not hesitate to contact us!

Copyright © 2022. All Rights Reserved.

Built with