Security awareness games by Infosec
On-demand training for every cybersecurity role
Certification training from industry experts
2021 IT & Security Talent Pipeline Study
Cyber Work Podcast
New cybersecurity career conversations every week
Join a team dedicated to making a difference.
Poor physical security can often defeat the best IT security controls. Printouts, unattended computers, phones and devices are at risk of being stolen or misused.
This module provides an overview of federal tax information (FTI), outlines penalties for unauthorized disclosure, and best practices for avoiding unauthorized disclosure.
This module outlines how to properly dispose of CJI, how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI.