Need to Know: Security by Design
Need to Know: IoT
Smart devices may not be smart choices when it comes to office security. Join Ivana and Erica as they check out the potential dangers of unshielded IoT.
Just the Facts: Business Email Compromise (BEC)
Take a look at an especially dangerous form of phishing: BEC, or Business Email Compromise. Learn about what BEC is, how it works and whom it targets.
Social Engineering Brief (No Background Music)
This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.