Security awareness games by Infosec
On-demand training for every cybersecurity role
Certification training from industry experts
2021 IT & Security Talent Pipeline Study
Cyber Work Podcast
New cybersecurity career conversations every week
Join a team dedicated to making a difference.
Duration: 2:12 Minutes
Cecil makes some poor choices as Erica and Karen team up to explain two-factor authentication.
Even after you've learned good security practices, you should share your knowledge with others.
This module reinforces the importance of secure data-disposal methods and shares best practices for disposal of sensitive data.
Personally identifiable information (PII) is any information which, either on its own or combined with other information, can be used to distinguish or trace an individual's identity.