General

View all 490 of our General content pieces available in SecurityIQ.

Infosec Named a Leader in 2019 Gartner Magic Quadrant

Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.

Social Engineering (Without TOC)

Social Engineering (Without TOC)

Social engineering occurs when a hacker uses two-way forms of communication, including phones and messaging, to trick users into sharing personal or confidential information. Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Shoulder Surfing

Shoulder Surfing

This video explains what shoulder surfing is and emphasizes the importance of situational awareness when entering sensitive information in public settings.

View More
Password Security (Simplified Navigation)

Password Security (Simplified Navigation)

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Marine Lowlifes Campaign Kit

Marine Lowlifes Campaign Kit

You don't need to be a communications expert, have an unlimited budget or set aside dozens of hours to create a truly engaging security awareness campaign. You just need the right resources and a playbook. Along with a brand new set of training modules, posters, infographics and email templates, the campaign kit comes with a communication plan to help you roll out every step of the campaign.

View More
Poster - NCSAM: Password Security

Poster - NCSAM: Password Security

View More
Physical Security (No Background Music)

Physical Security (No Background Music)

Physical security helps prevent losses of information and technology in the physical environment. Prevention tactics to combat each type of risk is also discussed.

View More
FCPA Assessment

FCPA Assessment

View More
Privacy and Data Security

Privacy and Data Security

View More
Working Remotely (Simplified Navigation)

Working Remotely (Simplified Navigation)

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure. Learners will gain deeper understanding of home networks and the devices and risks that come with them, and learn why use of public networks and devices should be avoided when possible.

View More
Social Engineering Brief

Social Engineering Brief

This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.

View More
EAL Phishing

EAL Phishing

This module teaches learners how to avoid falling victim to phishing.

View More
Protecting Federal Tax Information (No Background Music)

Protecting Federal Tax Information (No Background Music)

This module provides an overview of federal tax information (FTI), outlines penalties for unauthorized disclosure, and best practices for avoiding unauthorized disclosure.

View More
Red Flags Rule

Red Flags Rule

The Red Flags Rule requires financial institutions and creditors to develop written programs, or an Identity Theft Prevention Program, to detect and avoid identity theft.

View More
Password Security

Password Security

View More
CJIS Policy: Media Protection (No Background Music)

CJIS Policy: Media Protection (No Background Music)

This module outlines data-handling best practices, such as avoiding malware, applying encryption and proper disposal of physical media containing criminal justice information.

View More
Posters: Phishing - Don't Be a Target

Posters: Phishing - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
The Sarbanes-Oxley Act (SOX)

The Sarbanes-Oxley Act (SOX)

This module covers The Sarbanes-Oxley Act of 2002 (SOX), a law enacted to combat major, large-scale corporate and accounting fraud. In this module, we’ll review SOX mandates to enhance corporate responsibility, improve financial disclosures and combat corporate and accounting fraud.

View More
Posters: Cyber Security - Art of Cyber War

Posters: Cyber Security - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Conclusion (Without TOC)

Conclusion (Without TOC)

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
Password Security for Financial Institutions

Password Security for Financial Institutions

Our interactive Password Security module stresses the importance of following internal policies regarding access to sensitive financial information.

View More
Securing Mobile Devices (Without TOC)

Securing Mobile Devices (Without TOC)

Mobile devices are often used for both personal and business applications. This demands a different approach to information security than traditional workplace solutions. This module will inform learners on the differences between mobile devices and traditional desktop computers in the context of information security, and teach learners how to use mobile devices safely.

View More
Infographic - NCSAM: Online Shopping

Infographic - NCSAM: Online Shopping

View More
EAL Browser Event

EAL Browser Event

This module teaches learners about safe web browsing.

View More
Introduction to C-TPAT

Introduction to C-TPAT

The United States imports and exports trillions of dollars’ worth of goods and services every year. This module covers the Customs-Trade Partnership Against Terrorism, or C-TPAT.

View More
PCI DSS Assessment

PCI DSS Assessment

View More
Social Media

Social Media

This module explains common security risks related to the use of social media in business, and ways that learners can protect themselves and their company from social media threats.

View More
Marine Lowlifes: Whaling Shark Infographic

Marine Lowlifes: Whaling Shark Infographic

View More
Suspicious Hosts

Suspicious Hosts

Suspicious hosts are known malicious or potentially unsafe IP addresses or host names. This module will outline how safe browsing can protect Internet users from malicious attacks from suspicious hosts.

View More
Privacy and EU GDPR

Privacy and EU GDPR

In this module, we review the new European Union General Data Protection Regulation (EU GDPR).

View More
Poster - NCSAM: Online Shopping

Poster - NCSAM: Online Shopping

View More
The Art of Cyber War: Working Remotely

The Art of Cyber War: Working Remotely

Hackers steal information from unsecured connections.

View More
Poster - NCSAM: Mobile Security

Poster - NCSAM: Mobile Security

View More
Phishing for Healthcare Professionals and Providers

Phishing for Healthcare Professionals and Providers

Healthcare professionals with access to protected health information are popular hacker targets. This module will show how to identify phishing attacks, and how to report phishing attacks.

View More
Mobile Security for Educators

Mobile Security for Educators

This module identifies the security risks educational institutions face from business-based mobile device use.

View More
Posters: Security Incident Reporting - Art of Cyber War

Posters: Security Incident Reporting - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Suspicious Hosts Assessment (Google) W/ Hints

Suspicious Hosts Assessment (Google) W/ Hints

This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation. This version contains hints, pointing learners toward specific parts of the website.

View More
Removable Media (Simplified Navigation)

Removable Media (Simplified Navigation)

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Malware Brief

Malware Brief

An abbreviated version of our core malware training, this module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files.

View More
Posters: Safe Browsing - Don't Be a Target

Posters: Safe Browsing - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Malware (No Background Music)

Malware (No Background Music)

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.

View More
Creating Strong Passwords

Creating Strong Passwords

This short video details the process of choosing secure, robust passphrases in under one minute. Topics include the importance of using uncommon words and long passphrases.

View More
Data Destruction

Data Destruction

This module reinforces the importance of secure data-disposal methods and shares best practices for disposal of sensitive data.

View More
The Art of Cyber War: Physical Security

The Art of Cyber War: Physical Security

Poor physical security can often defeat the best IT security controls.

View More
Need to Know: Password Security

Need to Know: Password Security

A system is only as secure as its password. Join Anthony and Daryl as they get to grips with the challenges of creating a strong password … because safety is not as easy as 1-2-3.

View More
Posters: Phishing - Art of Cyber War

Posters: Phishing - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
GDPR- What is GDPR (Video)

GDPR- What is GDPR (Video)

A high level overview of the origin and aims of the General Data Protection Regulations.

View More
Mobile Security (Simplified Navigation)

Mobile Security (Simplified Navigation)

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices like screen locks, device encryption and Wi-Fi validation.

View More
NCSAM Toolkit

NCSAM Toolkit

View More
CPNI for Consumers

CPNI for Consumers

This security and awareness training covers Customer Proprietary Network Information, or CPNI.

View More
Posters: APT - Art of Cyberwar

Posters: APT - Art of Cyberwar

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Data Retention

Data Retention

Our Data Retention module defines data retention in the context of information security and explains the value of a data retention plan in specific scenarios. It will walk learners through common data retention plans, data types typically subject to data retention policies and secure data disposal considerations.

View More
Ransomware

Ransomware

Ransomware is malware, or malicious software, that holds technology for ransom. This module will show learners how ransomware works, what do if an infection occurs and how to avoid future infections.

View More
Security Awareness Baseline Knowledge Assessment III

Security Awareness Baseline Knowledge Assessment III

View More
End User's Guide to a Clean Inbox

End User's Guide to a Clean Inbox

View More
IoT Security

IoT Security

This interactive module discusses security risks related to Internet of Things (IoT), how connected devices may be attacked, and steps for safe use of IoT.

View More
The Art of Cyber War: Safe Browsing

The Art of Cyber War: Safe Browsing

Spyware, or malicious software, can be found in all corners of the Internet.

View More
Posters: Insider Threat - Don't Be a Target

Posters: Insider Threat - Don't Be a Target

PDF in two print sizes: -Printshop - Standard Poster -Self Print - Letter

View More
Handling SSA Provided Information

Handling SSA Provided Information

This module will review basic safe, federally-required practices for safely using and storing SSA-provided data, including best practices, review of certain applicable laws, and civil and criminal penalties for PII loss.

View More
Posters: Security Incident Reporting - Don't Be a Target

Posters: Security Incident Reporting - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Phishing for Financial Institutions

Phishing for Financial Institutions

This interactive training explains how financial sector employees and customers are targeted by phishing attacks and teaches users how to recognize phishing attacks.

View More
Infographic - NCSAM: Multi-Factor Authentication

Infographic - NCSAM: Multi-Factor Authentication

View More
Malware and PHI Assessment

Malware and PHI Assessment

View More
Posters: IPA - Don't Be a Target

Posters: IPA - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Phishing Assessment

Phishing Assessment

View More
GDPR - Breach Notification (Video)

GDPR - Breach Notification (Video)

This brief video covers the next steps for an organization should a breach occur.

View More
10 Ways to Recognize and Prevent Insider Threats

10 Ways to Recognize and Prevent Insider Threats

View More
Safe Web Browsing Brief

Safe Web Browsing Brief

This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections.

View More
Working Remotely short Assessment

Working Remotely short Assessment

View More
Internet Security

Internet Security

View More
10 Ways to Protect Your Personal Data

10 Ways to Protect Your Personal Data

View More
Privacy and PII Brief (India Localization)

Privacy and PII Brief (India Localization)

This version of our core Privacy and PII training explains privacy and personally identifiable information (PII). This version is localized for India to include protecting Aadaar numbers.

View More
Protecting Federal Tax Information (Simplified Navigation)

Protecting Federal Tax Information (Simplified Navigation)

View More
Check (Automatic Updates)

Check (Automatic Updates)

This micro-learning module highlights the importance of enabling automatic updates.

View More
Don't Be a Target: Your Trust

Don't Be a Target: Your Trust

Social engineering requires contact and trust, and frequently occurs over the phone or through text messages.

View More
Posters: Physical Security - Don't Be a Target

Posters: Physical Security - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Mobile Security Assessment

Mobile Security Assessment

View More
Poster - NCSAM: Software Updates

Poster - NCSAM: Software Updates

View More
Insider Threats Assessment

Insider Threats Assessment

View More
Phishing

Phishing

Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Password Security

Password Security

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Password Security Brief (No Background Music)

Password Security Brief (No Background Music)

This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised.

View More
Infographic - NCSAM: App Security

Infographic - NCSAM: App Security

View More
Marine Lowlifes: Clone Phish

Marine Lowlifes: Clone Phish

Sink into the depths to observe the Clone Phish, which disguises itself as a previously trustworthy message to lure in prey.

View More
Complying with NIST 800-171 Assessment

Complying with NIST 800-171 Assessment

View More
Need to Know: Conclusion

Need to Know: Conclusion

Take a moment to relax and review what you’ve learned as Anthony takes you through a few simple cybersecurity principles. Congratulations on completing your training!

View More
Business Email Compromise (BEC)

Business Email Compromise (BEC)

BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. This module suggests defenses against this tactic.

View More
Posters: Marine Lowlifes: Swimming in Emails

Posters: Marine Lowlifes: Swimming in Emails

View More
Removable Media (No Background Music)

Removable Media (No Background Music)

This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Breach Notification Assessment

Breach Notification Assessment

View More
Infographic - NCSAM: Mobile Security

Infographic - NCSAM: Mobile Security

View More
GDPR for Data Processors

GDPR for Data Processors

This security awareness training covers privacy and EU General Data Protection Regulation for data processors.

View More
Spoofed Email Address

Spoofed Email Address

Learn the warning signs for spoofed emails.

View More
Ransomware (No Background Music)

Ransomware (No Background Music)

Ransomware is malware, or malicious software, that holds technology for ransom. This modules will show learners how ransomware works, what do if an infection occurs and how to avoid future infections.

View More
Secure Connection (Data In Transit)

Secure Connection (Data In Transit)

This micro-learning module highlights the importance of using secure connections when conquering a mountain or sending sensitive data over the Internet.

View More
Phishing (Without TOC)

Phishing (Without TOC)

Phishing occurs when hackers use electronic messages (often email) to entice unsuspecting users to share personal information like passwords and credit card information. Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Removable Media & PHI

Removable Media & PHI

This module details best practices healthcare professionals can follow to safeguard protected health information and avoid infection from removable media.

View More
Diving Deeper into Phishing

Diving Deeper into Phishing

View More
Infographic - NCSAM: Phishing

Infographic - NCSAM: Phishing

View More
Malware for Educators

Malware for Educators

This interactive module defines malware and details the dangers it poses to educational institutions, as well as preventative actions.

View More
Posters: Suite - Don't Be a Target

Posters: Suite - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Introduction to Security Awareness

Introduction to Security Awareness

The module will outline cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
WORKed Episode 9: Tailgating

WORKed Episode 9: Tailgating

This week, the gang teases Ed and it’s totally justified. Show your employees why physical security is so important with this WORKed training module.

View More
Don't Be a Target: Your Colleague

Don't Be a Target: Your Colleague

Hackers recruit insiders with bribes and coercion. While the insider works for the organization; they are also working for the hacker to give them access to operations, data and money.

View More
Infographic - NCSAM: Password Security

Infographic - NCSAM: Password Security

View More
Password Security in Brief Assessment

Password Security in Brief Assessment

View More
The Art of Cyber War: Insider Threat

The Art of Cyber War: Insider Threat

Hackers recruit insiders with bribes and coercion. While the insider works for the organization; they are also working for the hacker to give them access to operations, data and money.

View More
Marine Lowlifes: Common Phish

Marine Lowlifes: Common Phish

Dive into the Sea of Emails for a closer look at one of the oldest scams still swimming today: the Common Phish.

View More
Mobile Wi-Fi Security Assessment

Mobile Wi-Fi Security Assessment

View More
WORKed Episode 11: X-Men

WORKed Episode 11: X-Men

Welcome to the danger room. Danger conference room, really. Teach your employees the importance of mobile security with this WORKed training module.

View More
Removable Media Brief

Removable Media Brief

This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices.

View More
CJIS Policy: Physical Security

CJIS Policy: Physical Security

This module covers the necessary defenses against unauthorized access to your facility and any paper copies of criminal justice information in your possession.

View More
PHI Life Cycle Assessment

PHI Life Cycle Assessment

View More
How to Recognize a Malicious Attachment

How to Recognize a Malicious Attachment

View More
WORKed Episode 2: Evite

WORKed Episode 2: Evite

I doth see a vision of scammery! Help your employees avoid phishing attacks with this WORKed training module.

View More
Ransomware (Without TOC)

Ransomware (Without TOC)

Ransomware is malware, or malicious software, that holds technology for ransom. This modules will show learners how ransomware works, what do if an infection occurs and how to avoid future infections.

View More
GDPR Basics

GDPR Basics

View More
PHI Policy

PHI Policy

This video shows the importance of formulating and implementing organizational policy regarding PHI.

View More
Working Remotely for Healthcare Professionals And Providers

Working Remotely for Healthcare Professionals And Providers

This module will outline HIPAA requirements for working remotely, such as using encrypted VPNs and securing personal devices.

View More
Recognizing Phishing Emails

Recognizing Phishing Emails

This short video covers some of the common signs of phishing emails and how to recognize malicious links.

View More
Don't Be a Target: Personal Information

Don't Be a Target: Personal Information

Personally identifiable information (PII) is any information which, either on its own or combined with other information, can be used to distinguish or trace an individual's identity.

View More
Posters: Marine Lowlifes: Common Phish

Posters: Marine Lowlifes: Common Phish

View More
Identifying Social Engineering

Identifying Social Engineering

This brief overview covers the hallmarks of social engineering attacks and how to prevent them.

View More
The Art of Cyber War: Removable Media

The Art of Cyber War: Removable Media

Hackers steal information from unencrypted, removable media.

View More
Posters: Marine Lowlifes: Spearphish

Posters: Marine Lowlifes: Spearphish

View More
Don't Be a Target: Your Database

Don't Be a Target: Your Database

Hackers depend on poorly defined data retention policies and bad policy compliance for opportunities to exploit and steal data.

View More
Physical Security for Financial Institutions

Physical Security for Financial Institutions

This module will review best practices for physical security as it relates to protecting printed financial and personal information, including facility access, device storage, physical record management and electronic record transmission.

View More
Suspicious Hosts Assessment

Suspicious Hosts Assessment

View More
The Art of Cyber War: Mobile Device Security

The Art of Cyber War: Mobile Device Security

We are no longer tied to our desks, and the use of mobile phones, tablets and other devices is growing.

View More
Malware Assessment

Malware Assessment

View More
Phishing (Simplified Navigation)

Phishing (Simplified Navigation)

Phishing occurs when hackers use electronic messages (often email) to entice unsuspecting users to share personal information like passwords and credit card information. Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Don't Be a Target: Your Reporting Policy

Don't Be a Target: Your Reporting Policy

For optimum protection against hackers, people must learn about security incidents in a complete, accurate and timely manner. Hackers expect that incident news will not be reported.

View More
Reporting Phishing Emails

Reporting Phishing Emails

Our Reporting Phishing Emails module reviews the functionality of the PhishNotify button, which allows users to report suspicious emails to system administrators through Outlook, Office 365 and Gmail.

View More
Protecting Devices and Media Infographic

Protecting Devices and Media Infographic

View More
APT Assessment

APT Assessment

View More
The Art of Cyber War: Phishing Attacks

The Art of Cyber War: Phishing Attacks

Hackers use email as the primary approach for phishing.

View More
Posters: Ransomware - Don't Be a Target

Posters: Ransomware - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Conclusion (Simplified Navigation)

Conclusion (Simplified Navigation)

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
Conclusion (No Background Music)

Conclusion (No Background Music)

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
Dumpster Diving

Dumpster Diving

Dumpster diving is a technique used by hackers and thieves to steal sensitive data from organizations.This short, one-minute video outlines the risks improperly disposed printed material, technology and removable media can pose to an organization.

View More
Password Security (Without TOC)

Password Security (Without TOC)

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation. We’ll explain how passwords may be stolen, and share real-world scenarios where weak or shared passwords compromise security.

View More
Posters: Insider Threat - Art of Cyber War

Posters: Insider Threat - Art of Cyber War

PDF in two print sizes: -Printshop - Standard Poster -Self Print - Letter

View More
Physical Security and PHI

Physical Security and PHI

HIPAA includes specific requirements for physical safeguards that every organization should have in place to secure protected health information (PHI).

View More
Social Engineering Brief Assessment

Social Engineering Brief Assessment

View More
WORKed Episode 10: Travel Stories

WORKed Episode 10: Travel Stories

Jack gets a little risky on the road. Teach your employees the keys to working remotely with this WORKed training module.

View More
Posters: Removable Media - Don't Be a Target

Posters: Removable Media - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Physical Security and PHI Assessment

Physical Security and PHI Assessment

View More
Introduction to Security Awareness (Without TOC)

Introduction to Security Awareness (Without TOC)

In this module, we’ll jump-start your security awareness training program by demonstrating and reinforcing the critical need for comprehensive cybersecurity programs in the workplace. The module will outline key areas of program focus such as cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Physical Security And Student Records

Physical Security And Student Records

This module will review best practices for physical security as it relates to protecting printed student educational and personal information, including facility access, device storage, physical record management and electronic record transmission.

View More
The Art of Cyber War: Security Incident Reporting

The Art of Cyber War: Security Incident Reporting

Sharing this information is good for everyone and exposes the activities of hackers.

View More
CPNI for Providers

CPNI for Providers

This security and awareness training covers Customer Proprietary Network Information, or CPNI.

View More
Handling SSA Provided Information (Simplified Navigation)

Handling SSA Provided Information (Simplified Navigation)

View More
Insider Threats (Simplified Navigation)

Insider Threats (Simplified Navigation)

View More
Data Security Assessment

Data Security Assessment

View More
Marine Lowlifes: Spearphish Infographic

Marine Lowlifes: Spearphish Infographic

View More
Handling CJI Assessment

Handling CJI Assessment

View More
Who Can You Trust? (Social Engineering)

Who Can You Trust? (Social Engineering)

This video highlights the risks of disclosing patient information without first verifying requester identity.

View More
Acceptable Use Assessment

Acceptable Use Assessment

View More
Posters: Malware - Don't Be a Target

Posters: Malware - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
To Change a Lightbulb (IoT)

To Change a Lightbulb (IoT)

This micro-learning module stresses the need for network security in the age of IoT.

View More
Program Introduction Assessment

Program Introduction Assessment

View More
Posters: Cloud Services - Don't Be a Target

Posters: Cloud Services - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Malware

Malware

This interactive module defines malware in common terms, details the dangers it poses to organizations, and discusses preventative actions.

View More
Posters: Remote Connection - Art of Cyber War

Posters: Remote Connection - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Marine Lowlifes Campaign Kit

Marine Lowlifes Campaign Kit

View More
Mobile, Wireless and Remote Access

Mobile, Wireless and Remote Access

View More
Help Desk

Help Desk

Our Help Desk module explains how hackers can exploit the trust between a help desk and its users through social engineering attacks.

View More
Mobile Security Assessment

Mobile Security Assessment

View More
Protecting Mobile Devices

Protecting Mobile Devices

This video covers the steps you can take to protect your device from prying eyes and theft. Topics include screen locks, encryption and frequent software and firmware updates.

View More
Encryption

Encryption

This module explains the concept of encryption in common terms. It details the encryption process and types of assets that can be encrypted, and reinforces the importance of following encryption-related policies to protect sensitive information.

View More
Data Destruction Assessment

Data Destruction Assessment

View More
Protecting Federal Tax Information Assessment

Protecting Federal Tax Information Assessment

View More
Red Flags Rule Assessment

Red Flags Rule Assessment

View More
Privacy Risks (Video)

Privacy Risks (Video)

This module covers covers the consequences of privacy violations for businesses.

View More
Locked Down (Lock Screens)

Locked Down (Lock Screens)

This micro-learning module emphasizes the importance of locking your screens.

View More
Advanced Security Awareness

Advanced Security Awareness

View More
FAR Code of Conduct

FAR Code of Conduct

Learners will explore the FAR Code of Conduct and the requirements for staying in compliance as a contractor for the federal government.

View More
International Travel Security

International Travel Security

This security awareness module introduces common information security risks found when traveling abroad.

View More
Introduction To HIPAA

Introduction To HIPAA

This module briefly covers the main points of HIPAA compliance.

View More
Posters: Marine Lowlifes: Clone Phish

Posters: Marine Lowlifes: Clone Phish

View More
PCI DSS Brief

PCI DSS Brief

This module is an abbreviated version of our core PCI-DSS training. It outlines the six main goals of the PCI-DSS, common threats and best practices for handling credit card data.

View More
Better Together (Two Factor Authentication)

Better Together (Two Factor Authentication)

This micro-learning module presents the concept of two-factor authentication in a delicious way!

View More
CJI Security Policy Assessment

CJI Security Policy Assessment

View More
One Wrong Move (Phishing)

One Wrong Move (Phishing)

This one-minute video uses actors, professionally produced scenes and compelling narrative to reinforce the consequences of a phishing attack.

View More
Personal Information (Video)

Personal Information (Video)

This module covers personally identifiable information and how to protect it online.

View More
Social Engineering for Financial Institutions

Social Engineering for Financial Institutions

This social engineering module teaches a three-step method to add clarity to a confusing conversation, verify suspicious requests and identity theft prevention prescribed by the Red Flags Rule.

View More
Removable Media

Removable Media

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Social Engineering Defenses

Social Engineering Defenses

This brief video shows you how to recognize and prevent social engineering attacks.

View More
Don't Be a Target: Your Unencrypted Files

Don't Be a Target: Your Unencrypted Files

Encryption is the best defense against unwanted use of data, before and/or after it is stolen.

View More
Safe Harbor (Safe Web Browsing)

Safe Harbor (Safe Web Browsing)

How to browse the web safely.

View More
Posters: Physical Security - Art of Cyber War

Posters: Physical Security - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Intelligent Personal Assistant

Intelligent Personal Assistant

This module defines Intelligent Personal Assistants and how they work, and explains some of the risks associated with using intelligent personal assistants in the workplace.

View More
How Secure Is Public WiFi? (Public WiFi)

How Secure Is Public WiFi? (Public WiFi)

In just one minute, this video explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers.

View More
Intellectual Travel Protection Assessment

Intellectual Travel Protection Assessment

View More
The Art of Cyber War: Cyber Security

The Art of Cyber War: Cyber Security

The threat of cyberattack is real, it’s everyone’s responsibility to learn more about cyber protection.

View More
COPPA Assessment

COPPA Assessment

View More
Data Security (No Exercises)

Data Security (No Exercises)

In this module, learners are introduced to the concept of data security, its significance and the risks posed by insecure data handling.

View More
Public Networks and Computers

Public Networks and Computers

This training module will teach learners how limit security risks while using public networks and computers.

View More
HIPAA/HITECH (Simplified Navigation)

HIPAA/HITECH (Simplified Navigation)

View More
Security Awareness Baseline Knowledge Assessment II

Security Awareness Baseline Knowledge Assessment II

View More
Safe Web Browsing for Financial Institutions

Safe Web Browsing for Financial Institutions

Our interactive Safe Browsing module shows learners how hackers can launch attacks on financial institutions from unsafe websites and outlines best practices for safe browsing for financial sector employees.

View More
Phishing for Educators

Phishing for Educators

This interactive training explains how education-sector employees and students are targeted by phishing attacks and how to identify fake requests for student records.

View More
Safe Web Browsing Assessment

Safe Web Browsing Assessment

View More
Securing Home Networks and Devices Assessment

Securing Home Networks and Devices Assessment

View More
Physical Security (Simplified Navigation)

Physical Security (Simplified Navigation)

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
How Much Is Too Much? (Password Security)

How Much Is Too Much? (Password Security)

In less than one minute, this video reinforces the importance of keeping passwords private.

View More
Mobile Security (Without TOC)

Mobile Security (Without TOC)

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices like screen locks, device encryption and Wi-Fi validation.

View More
Physical Security short Assessment

Physical Security short Assessment

View More
Physical Security

Physical Security

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
Removable Media for Educators

Removable Media for Educators

This interactive module covers security risks to educational institutions posed by removable media, and risks of student data breaches from lost or stolen media.

View More
Working Remotely for Educators

Working Remotely for Educators

This interactive module details networking essentials and best security practices to keep remote education-sector personnel secure. Secure methods for accessing student data remotely are discussed.

View More
Physical Security (Without TOC)

Physical Security (Without TOC)

Physical security helps prevent losses of information and technology in the physical environment. This interactive module identifies physical security vulnerabilities, like printers and trash cans, and the risks employees face when technology is left unattended in publicly accessible areas. Prevention tactics to combat each type of risk is also discussed.

View More
Need to Know: Malware

Need to Know: Malware

Trojan horses, worms, RATs — There’s a whole animal kingdom of malware out there. Join Anthony and Fiona as they explore the best ways to keep malware from migrating into your system.

View More
Security Awareness for High School

Security Awareness for High School

This module teaches high school students how to use computers and the internet safely and responsibly.

View More
Computer Security with Paige the Panda

Computer Security with Paige the Panda

This module for kids talks about how to use computers safely.

View More
Mobile Security

Mobile Security

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices.

View More
Introduction to CCPA Assessment

Introduction to CCPA Assessment

View More
Password Security (No Background Music)

Password Security (No Background Music)

Our interactive Password Security module shows learners how to create complex, but easy-to-remember, passwords following best practices for password creation.

View More
Don't Be a Target: Your Virtual Assistant

Don't Be a Target: Your Virtual Assistant

They may pose a security risk by allowing unauthorized access to your accounts while you are not present.

View More
HIPAA Assessment

HIPAA Assessment

View More
Gramm-Leach-Bliley Act (GLBA)

Gramm-Leach-Bliley Act (GLBA)

This module will define the Gramm-Leach-Bliley Act (GLBA), explain its purpose and detail the consequences of non-compliance.

View More
CJIS Policy: Dissemination & Destruction

CJIS Policy: Dissemination & Destruction

This module outlines how to properly dispose of CJI, how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI.

View More
Secure Data Storage

Secure Data Storage

This module covers how to securely store personal data.

View More
Posters: Data Retention - Art of Cyber War

Posters: Data Retention - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Poster - NCSAM: Social Media Security

Poster - NCSAM: Social Media Security

View More
Tax Scam Season Announcement

Tax Scam Season Announcement

View More
Posters: Spearphishing - Don't Be a Target

Posters: Spearphishing - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Social Media (Without TOC)

Social Media (Without TOC)

Social media has become an integral part of everyday life for individuals and businesses. In many cases, it is the primary method used to communicate with friends, family and customers. This module explains common security risks related to the use of social media in business, and ways that learners can protect themselves and their company from social media threats.

View More
Help Desk Assessment

Help Desk Assessment

View More
Check Yourself (BEC scams)

Check Yourself (BEC scams)

This micro-learning module emphasizes the need to verify wire transfers.

View More
Don't Be a Target: Your Department

Don't Be a Target: Your Department

Given the threat that hackers pose to you and your organization, it's everyone's responsibility to learn more about cyber protection.

View More
The Art of War: Intelligent Personal Assistant

The Art of War: Intelligent Personal Assistant

Intelligent Personal Assistants (IPAs) assist us by accessing information and interacting with other technology, usually through voice commands.

View More
Safe Web Browsing (Simplified Navigation)

Safe Web Browsing (Simplified Navigation)

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. Topics include use of HTTPS (using SSL or TLS), unsafe links, web pop-ups, browser alerts, plugins and downloads. Lessons from our Phishing and Malware modules are also reinforced for increased retention.

View More
Working Remotely

Working Remotely

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure.

View More
Intellectual Property Assessment

Intellectual Property Assessment

View More
Need to Know: Safe Web Browsing

Need to Know: Safe Web Browsing

It’s a jungle in there. Explore the winding paths of the internet with Anthony and Cecil as they venture into thorny areas like fake browser warnings, HTTPS and dangerous URLs.

View More
Safe Web Browsing Brief (No Background Music)

Safe Web Browsing Brief (No Background Music)

This abbreviated version of our Safe Browsing module summarizes the best practices for safe browsing regarding pop-ups, links, hostnames and Internet connections.

View More
Removable Media Brief (No Background Music)

Removable Media Brief (No Background Music)

This summary course gives learners a basic understanding of the risks associated with removable media and how to avoid infection from these devices.

View More
Spam or Phishing Email?

Spam or Phishing Email?

View More
Posters: Spearphishing - Art of Cyber War

Posters: Spearphishing - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
FERPA Assessment

FERPA Assessment

View More
CJIS Policy: Media Protection

CJIS Policy: Media Protection

This module outlines data-handling best practices, such as avoiding malware, applying encryption and proper disposal of physical media containing criminal justice information.

View More
Posters: Encryption - Don't Be a Target

Posters: Encryption - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Working Remotely for Financial Institutions

Working Remotely for Financial Institutions

Designed specifically for financial sector employees working remotely, this interactive module details networking essentials and security best practices to help keep remote personnel secure.

View More
Password Security Assessment

Password Security Assessment

View More
Introduction to Security Awareness (Simplified Navigation)

Introduction to Security Awareness (Simplified Navigation)

In this module, we’ll jump-start your security awareness training program by demonstrating and reinforcing the critical need for comprehensive cybersecurity programs in the workplace. The module will outline key areas of program focus such as cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
Privacy and PII Brief (No Background Music)

Privacy and PII Brief (No Background Music)

This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII).

View More
Electronic Funds Transfer Act (EFTA) Assessment

Electronic Funds Transfer Act (EFTA) Assessment

View More
Public Networks and Computers Assessment

Public Networks and Computers Assessment

View More
HIPAA Minimum Necessary Standard

HIPAA Minimum Necessary Standard

This brief video extrapolates on how many people are authorized to access one person's health records.

View More
Posters: Social Engineering - Don't Be a Target

Posters: Social Engineering - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Don't Be a Target: CEO'S Email

Don't Be a Target: CEO'S Email

The most dangerous type of phishing is known as "Spear Phishing." A spear phisher will craft messages to target individuals or small groups. These emails may appear to come from business associates, or even the CEO.

View More
Identity Theft

Identity Theft

Introduces the concept of Identity Theft, common ways a person’s identity might be stolen, possible impact for an individual and an enterprise, and ways to protect your identity.

View More
Social Engineering (No Background Music)

Social Engineering (No Background Music)

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
FERPA for K-12

FERPA for K-12

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.

View More
Safe Use of Social Media

Safe Use of Social Media

This short video covers the precautions you should take when making public posts and provides guidance on how to spot harmful links.

View More
Creating Strong Passwords Assessment

Creating Strong Passwords Assessment

View More
Malware and PHI

Malware and PHI

Malware infections are considered a HIPAA security incident. This module teaches healthcare professionals how to identify malware and actions organizations can take to avoid malware infections.

View More
Poster - NCSAM: Multi-Factor Authentication

Poster - NCSAM: Multi-Factor Authentication

View More
A Few Extra Seconds (Lock Screens)

A Few Extra Seconds (Lock Screens)

Why you should use lock screens on your devices.

View More
Posters: Password Security - Art of Cyber War

Posters: Password Security - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Phishing Assessment (Capital One) W/ Hints

Phishing Assessment (Capital One) W/ Hints

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications.

View More
Posters: Ransomware - Art of Cyber War

Posters: Ransomware - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Reporting Phishing Emails Assessment

Reporting Phishing Emails Assessment

View More
Privacy and PII Assessment

Privacy and PII Assessment

View More
Safe Web Browsing

Safe Web Browsing

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing.

View More
Incident Response Assessment

Incident Response Assessment

View More
Lost and Found (Encryption)

Lost and Found (Encryption)

Why you should use encryption in sensitive environments.

View More
The Art of Cyber War: Encryption

The Art of Cyber War: Encryption

Encryption transforms data into a locked format that cannot be read without a key, You can encrypt stored data, data en route for communications and devices that may used for storage.

View More
Infographic - NCSAM: Social Media Security

Infographic - NCSAM: Social Media Security

View More
The Art of Cyber War: Password Security

The Art of Cyber War: Password Security

If you fail to protect your password or choose a weak password, you are at risk.

View More
Spearphishing

Spearphishing

Spearphishing occurs when phishing messages are tailored for targeted individuals. This interactive module will help teams identify and avoid spearphishing attempts.

View More
Posters: Mobile Device - Art of Cyber War

Posters: Mobile Device - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Where Is Your Device? (Backups)

Where Is Your Device? (Backups)

This 60-second video details the importance of physical security and frequent data backups.

View More
GDPR: What is GDPR? Assessment

GDPR: What is GDPR? Assessment

View More
Marine Lowlifes Resource Library

Marine Lowlifes Resource Library

View More
Posters: Password Security - Don't Be a Target

Posters: Password Security - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
HIPAA HITECH

HIPAA HITECH

Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI. We’ll also suggest additional resources for PHI-related questions in the workplace

View More
Don't Be a Target: Your Password

Don't Be a Target: Your Password

If you fail to protect your password or choose a weak password, you are at risk. A weak password can be guessed by hackers in minutes.

View More
The Foreign Corrupt Practices Act (FCPA)

The Foreign Corrupt Practices Act (FCPA)

The Foreign Corrupt Practices Act (FCPA) monitors the international business community to prevent occurrence of bribes, kickbacks and other unacceptable business practices. This module defines the FCPA and outlines compliance needs, explores important definitions and provisions of the regulation, and suggests methods to help organizations avoid risks when conducting business with foreign officials.

View More
Social Engineering Assessment

Social Engineering Assessment

View More
The Art of Cyber War: Cloud Service

The Art of Cyber War: Cloud Service

"The Cloud" is just another word for internet-based hosting and storage services offered by external companies. Make sure your Cloud is secure, remains private and contains all of the data you expect.

View More
Mobile Security for Healthcare Professionals

Mobile Security for Healthcare Professionals

This security awareness module covers best practices for healthcare professionals to ensure HIPAA compliance when using mobile devices to store or access protected health information.

View More
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

This module explains how to recognize advanced persistent threats (APT), APT risks and common attack methods.

View More
Introduction to Account Takeover Attacks (ATO)

Introduction to Account Takeover Attacks (ATO)

Learn about account takeover attacks: what they are, what they aim for, and how to keep yourself safe from them.

View More
WORKed Episode 3: Robot Lawnmower

WORKed Episode 3: Robot Lawnmower

Is Ed getting scammed? You decide. But the answer is totally yes. Teach your employees the basics of safe wab browsing with this WORKed training module.

View More
Insider Threats

Insider Threats

Insider threats include security threats posed by employees, contractors or vendors. This module explains why malicious insiders are dangerous, and provides examples of common behaviors that can be indicators of insider threats. Suggestions for incident reporting are also included to help combat insider threats.

View More
GDPR: Breach Notification Assessment

GDPR: Breach Notification Assessment

View More
One Person's Trash... (Dumpster Diving)

One Person's Trash... (Dumpster Diving)

This mini movie covers the consequences of failing to shred, burn, or properly dispose of sensitive physical documents.

View More
Social Media Assessment

Social Media Assessment

View More
Intellectual Property

Intellectual Property

This module covers important intellectual property protection mechanisms (patents, trademarks, and copyrights) and how they apply to various types of products, including software and digital media.

View More
GDPR: Rights of Data Subjects Assessment

GDPR: Rights of Data Subjects Assessment

View More
Encryption Assessment

Encryption Assessment

View More
FERPA for Post-Secondary Education

FERPA for Post-Secondary Education

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for post-secondary institutions.

View More
Software Licensing Assessment

Software Licensing Assessment

View More
Cloud Services Assessment

Cloud Services Assessment

View More
Poster - NCSAM: App Security

Poster - NCSAM: App Security

View More
Ransomware Assessment

Ransomware Assessment

View More
10 Tips for Spotting SMishing and Vishing

10 Tips for Spotting SMishing and Vishing

View More
Privacy and PII

Privacy and PII

Our Privacy and PII module defines privacy and Personally Identifiable Information (PII), and reinforces the importance of data security in the workplace.

View More
Phishing Assessment (Capital One)

Phishing Assessment (Capital One)

This assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking Capital One communications.

View More
Removable Media Assessment

Removable Media Assessment

View More
Suspicious Hosts Assessment (Google)

Suspicious Hosts Assessment (Google)

This interactive module will test learners’ abilities to recognize suspicious hosts in a realistic website simulation.

View More
Password Security Brief

Password Security Brief

This module will summarize the best practices associated with creating and managing strong passwords, how to safely store passwords and what to do if you suspect that a password has been compromised.

View More
Vishing Assessment

Vishing Assessment

View More
Posters: Social Engineering - Art of Cyber War

Posters: Social Engineering - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Need to Know: Social Engineering

Need to Know: Social Engineering

Some hackers don’t need computers at all. Join Anthony and Erica in exploring the dirty business of social engineering — when all it takes is a lie to crack open a company.

View More
WORKed Episode 5: Mallomars

WORKed Episode 5: Mallomars

You can be nice and still question everything that comes your way. Help your employees avoid social engineering attacks with this WORKed training module.

View More
Posters: Cloud Services - Art of Cyberwar

Posters: Cloud Services - Art of Cyberwar

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Don't Be a Target: Your Organization

Don't Be a Target: Your Organization

Hacker's use Advanced Persistent Threats (APT) to access a network and stay undetected. Targets are typically large businesses and organizations.

View More
SMiShing

SMiShing

SMS Phishing, or SMiShing, is used by cyber criminals to collect valuable information and distribute malware. After completing this module, learners will know what SMiShing is, how to recognize a SMiShing attack and effective ways to stop SMiShing attempts.

View More
Posters: Suite - Art of Cyber War

Posters: Suite - Art of Cyber War

PDF in two print sizes: -Printshop - Letter -Self Print - Letter

View More
Social Engineering

Social Engineering

View More
Data Backup And Recovery (Video)

Data Backup And Recovery (Video)

This module emphasizes the importance of data backup and recovery.

View More
Tailgating

Tailgating

This video explains the risks of tailgating, or when hackers gain physical access to restricted areas. It also details physical security best practices for your office or campus.

View More
Consequences of PHI Release Assessment

Consequences of PHI Release Assessment

View More
Ransomware and HIPAA

Ransomware and HIPAA

This short module will teach learners the risks of ransomware in the healthcare industry, including whether a ransomware infection is considered a HIPAA data breach.

View More
Securing Mobile Devices

Securing Mobile Devices

Mobile devices are often used for both personal and business applications. This demands a different approach to information security than traditional workplace solutions.

View More
Posters: Removable Media - Art of Cyber War

Posters: Removable Media - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Security Awareness Baseline Knowledge Assessment I

Security Awareness Baseline Knowledge Assessment I

View More
CJIS: Handling CJI

CJIS: Handling CJI

This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of noncompliance.

View More
Physical Security Brief Assessment

Physical Security Brief Assessment

View More
Poster - NCSAM: Customer Data

Poster - NCSAM: Customer Data

View More
SMiShing Assessment

SMiShing Assessment

View More
Anti-Money Laundering Assessment

Anti-Money Laundering Assessment

View More
Working Remotely Assessment

Working Remotely Assessment

View More
Safe Web Browsing Brief Assessment

Safe Web Browsing Brief Assessment

View More
Antivirus Assessment

Antivirus Assessment

View More
GDPR: Important Definitions Assessment

GDPR: Important Definitions Assessment

View More
Vishing

Vishing

This interactive training module covers voice phishing, or vishing, a simple but effective technique cyber criminals and scam artists use to collect confidential information.

View More
Phishing (No Background Music)

Phishing (No Background Music)

Phishing occurs when hackers use electronic messages (often email) to entice unsuspecting users to share personal information like passwords and credit card information. Our interactive phishing training outlines where phishing messages may appear, how to distinguish phishing from normal communications, and when and how to report phishing attacks.

View More
Intellectual Property Rights Assessment

Intellectual Property Rights Assessment

View More
Posters: Cyber Security - Don't Be a Target

Posters: Cyber Security - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Gramm-Leach-Bliley Act (GLBA) Assessment

Gramm-Leach-Bliley Act (GLBA) Assessment

View More
Dissemination and Destruction Assessment

Dissemination and Destruction Assessment

View More
PHI Life Cycle (Video)

PHI Life Cycle (Video)

This video follows PHI from creation to disposal, and covers the specific definitions used by HIPAA to define that life cycle.

View More
FAR Code of Conduct Assessment

FAR Code of Conduct Assessment

View More
Posters: Mobile Device - Don't Be a Target

Posters: Mobile Device - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
The Family Educational Rights and Privacy Act (FERPA)

The Family Educational Rights and Privacy Act (FERPA)

This module covers the Family Educational Rights and Privacy Act (FERPA), discusses the types of student education record information covered and what must be documented when a FERPA request is made.

View More
Infographic - NCSAM: Customer Data

Infographic - NCSAM: Customer Data

View More
Don't Be a Target: Cloud Service

Don't Be a Target: Cloud Service

Make sure your Cloud is secure, remains private and contains all of the data you expect.

View More
Privacy and PII (Without TOC)

Privacy and PII (Without TOC)

Our Privacy and PII module defines privacy and Personally Identifiable Information (PII), and reinforces the importance of data security in the workplace. Topics covered include best practices for collecting, storing, using, sharing and disposing of personal information per US government recommendations, and includes interactive team exercises for content review and reinforcement.

View More
Need to Know: Introduction

Need to Know: Introduction

Begin at the beginning as Anthony introduces you to our plan for what’s to come. Let’s talk about hackers, cybersecurity, and why it pays to keep a good head on your shoulders.

View More
Media Protection Assessment

Media Protection Assessment

View More
Need to Know: Mobile Security

Need to Know: Mobile Security

Join Anthony and Ivana as they explore the ups and downs of phone security. What is encryption? What kind of damage could a stolen phone do? Learn how to take security with you wherever you go.

View More
Social Engineering (Simplified Navigation)

Social Engineering (Simplified Navigation)

Social engineering occurs when a hacker uses two-way forms of communication, including phones and messaging, to trick users into sharing personal or confidential information. Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Malware (Simplified Navigation)

Malware (Simplified Navigation)

This interactive module defines malware in common terms and details the dangers it poses to organizations. Practical and applicable preventative actions are summarized in three anti-malware recommendations: avoiding suspicious downloads, attachments and other files, frequent/automated software patches and proper use of anti-virus software.

View More
Creating a Cyber Secure Home

Creating a Cyber Secure Home

This module covers steps people can take to protect their home networks and personal devices, and the value of creating backups of important files.

View More
Removable Media (Without TOC)

Removable Media (Without TOC)

Removable media includes USB drives, CDs and personal devices such as phones, cameras and tablets. This interactive module covers two key areas of focus: safe use of removable media for legitimate purposes, and types of attacks hackers launch from “lost” removable media.

View More
Safe Web Browsing for Educators

Safe Web Browsing for Educators

Our interactive Safe Browsing module shows learners how hackers can launch attacks on educational institutions from unsafe websites and outlines best practices for safe browsing.

View More
Posters: Data Retention - Don't Be a Target

Posters: Data Retention - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Don't Be a Target: Your Technology

Don't Be a Target: Your Technology

Ransomware holds hostage technology and data that is critical for running your most vital operations.

View More
Consequences of PHI Release

Consequences of PHI Release

This brief video walks the learner through the possible consequences of a PHI breach at your organization.

View More
PHI Definition

PHI Definition

This video explains Protected Health Information (PHI) and provides examples of individually identifiable health information.

View More
Knowledge Is Power (Security Training)

Knowledge Is Power (Security Training)

Security training should be a part of your daily life.

View More
Cloud Services

Cloud Services

Cloud services include any service available via the Internet through a third-party’s server. This module will define the cloud and different types of cloud services available, and explain the benefits and risks of cloud-based services.

View More
Social Engineering

Social Engineering

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Security Awareness for Middle School

Security Awareness for Middle School

This module teaches middle school students how to use computers and the internet safely.

View More
Safe Web Browsing for Healthcare Professionals and Providers

Safe Web Browsing for Healthcare Professionals and Providers

This module will define safe browsing and show healthcare professionals how PHI can be compromised through malicious plugins and downloads.

View More
Posters: Malware - Art of Cyber War

Posters: Malware - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Social Engineering Brief (No Background Music)

Social Engineering Brief (No Background Music)

This module walks learners through the key components of social engineering and how to recognize and respond to suspicious requests.

View More
Posters: Marine Lowlifes: Whaling Shark

Posters: Marine Lowlifes: Whaling Shark

View More
Introduction to Malware

Introduction to Malware

View More
Malware in Brief Assessment

Malware in Brief Assessment

View More
WORKed: Teaser

WORKed: Teaser

Use the WORKed Teaser video to draw attention to your campaign and preview what's to come.

View More
Don't Be a Target: Your Mobile Device

Don't Be a Target: Your Mobile Device

Many of these devices use their own wireless networks and are used in public. These facts make your mobile phones and devices susceptible to hackers.

View More
WORKed Episode 1: Bathroom

WORKed Episode 1: Bathroom

Scandal in the men’s room! Show your employees how to treat removable media in this WORKed training module.

View More
Incident Response

Incident Response

This module will explore the basics of incident response and the first rules of keeping people and data safe.

View More
Don't Be a Target: Your Hardware

Don't Be a Target: Your Hardware

Poor physical security can often defeat the best IT security controls. Printouts, unattended computers, phones and devices are at risk of being stolen or misused.

View More
Ten Tips for Physical Security Infographic

Ten Tips for Physical Security Infographic

View More
CJIS Security Policy

CJIS Security Policy

This module provides a detailed explanation of Criminal Justice Information Security (CJIS) policy requirements, who must comply with CJIS policy and how to respond to incidents involving CJI.

View More
Secure Data Storage Assessment

Secure Data Storage Assessment

View More
Mobile Wi-Fi Security

Mobile Wi-Fi Security

Our Mobile Wi-Fi Security module explains how to safely use wireless devices when operating on Wi-Fi connections.

View More
Physical Security Brief (No Background Music)

Physical Security Brief (No Background Music)

An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology.

View More
The Art of Cyber War: Removable Media

The Art of Cyber War: Removable Media

Hackers steal information from unencrypted, removable media.

View More
Loose Lips Sink Ships

Loose Lips Sink Ships

This video covers the risks of carrying out business outside of your facility.

View More
Don't Be a Target: Your Remote Connection

Don't Be a Target: Your Remote Connection

Hackers steal information from unsecured connections. You can feel safe when working remotely if your network connection are properly secured.

View More
Introduction to NIST 800-171

Introduction to NIST 800-171

NIST 800-171 is just one of many federal publications that contractors and companies working with the government are required to comply with. This module will introduce you to NIST 800-171: what it is, and what to do about it.

View More
Securing Home Networks and Devices (Without TOC)

Securing Home Networks and Devices (Without TOC)

Protecting home computers and networks can help keep company networks secure, especially those with remote or mobile workforces. This interactive module shows learners how to implement many of the same protections at home that IT staff use at the office.

View More
Conclusion

Conclusion

This module will review and reinforce critical lessons from your Infosec IQ awareness training to increase team retention of core program content.

View More
Physical Security Assessment

Physical Security Assessment

View More
The Art of Cyber War: Spear Phishing Attacks

The Art of Cyber War: Spear Phishing Attacks

The most dangerous type of phishing is known as "Spear Phishing." A spear phisher will craft messages to target individuals or small groups.

View More
9 BEC Attack Red Flags

9 BEC Attack Red Flags

View More
Phishing in Brief (No Background Music)

Phishing in Brief (No Background Music)

This module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate.

View More
Introduction to DFARS

Introduction to DFARS

This security and awareness training is an introduction to DFARS, or the Defense Federal Acquisition Regulation Supplement.

View More
Physical Security Brief

Physical Security Brief

An abbreviated version of our physical security training, this module provides basic understanding of how to avoid theft and misuse of printed materials and unattended technology.

View More
Privacy and PII Brief

Privacy and PII Brief

This abbreviated version of our core Privacy and PII training will explain the basic concepts of privacy and personally identifiable information (PII).

View More
Infographic - NCSAM: Software Updates

Infographic - NCSAM: Software Updates

View More
PCI DSS

PCI DSS

This module details the training, policies and procedures required for Payment Card Industry Security Standard (PCI-DSS) compliance for handling branded credit cards from major vendors.

View More
Safe Web Browsing (Without TOC)

Safe Web Browsing (Without TOC)

Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. Topics include use of HTTPS (using SSL or TLS), unsafe links, web pop-ups, browser alerts, plugins and downloads. Lessons from our Phishing and Malware modules are also reinforced for increased retention.

View More
Double Check (Verifying Wire Transfers)

Double Check (Verifying Wire Transfers)

This micro-learning module emphasizes the importance of verifying wire transfers.

View More
Hackjob Season 1 Episode 1

Hackjob Season 1 Episode 1 "Recon"

h@ckj0b is your security team’s worst nightmare come to life. Will TechniCorp Dynamix survive Vermintooth’s assault, or will Tim leave them to deal with the mess they’ve gotten themselves into?

View More
Security Awareness Baseline Knowledge Assessment IV

Security Awareness Baseline Knowledge Assessment IV

View More
Electronic Funds Transfer Act (EFTA)

Electronic Funds Transfer Act (EFTA)

Almost everyone uses online banking, but there are many ways an electronic fund transfer could go wrong. If someone makes fraudulent charges on your account, what are your responsibilities? What are the bank’s? The Electronic Funds Transfer Act has your back.

View More
Security Awareness Review

Security Awareness Review

View More
Security at Home Infographic

Security at Home Infographic

View More
Don't Be a Target: Your Browser

Don't Be a Target: Your Browser

Attackers exploit browsers to infect, take control, steal information, destroy files and hijack and stage attacks from your computer.

View More
Is it Safe? (Mobile Security)

Is it Safe? (Mobile Security)

This short video reinforces the importance of using trusted publishers when installing mobile applications. It uses actors, professionally produced scenes and compelling narrative to reinforce the consequences of insecure mobile applications.

View More
Marine Lowlifes: Common Phish Infographic

Marine Lowlifes: Common Phish Infographic

View More
CPNI for Providers Assessment

CPNI for Providers Assessment

View More
Sarbanes-Oxley Act Assessment

Sarbanes-Oxley Act Assessment

View More
Posters: PII - Art of Cyber War

Posters: PII - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
The Art of Cyber War: Personal Identification Information

The Art of Cyber War: Personal Identification Information

Personally identifiable information (PII) is any information which, either on its own or combined with other information, can be used to distinguish or trace an individual's identity.

View More
Password Security for Educators

Password Security for Educators

Our interactive Password Security module stresses the importance of following internal policies regarding access to sensitive student information.

View More
Launch Email - General Workforce

Launch Email - General Workforce

View More
Am I Hacked?

Am I Hacked?

Learn the signs that your computer or one of your devices has been hacked, and how to respond.

View More
Need to Know: Removable Media

Need to Know: Removable Media

Can a thumb drive topple a company? It’s more likely than you think. Join Anthony and Harold as they check out the dangers of removable media — the good, the bait and the ugly.

View More
WORKed Episode 8: Eagle Eye

WORKed Episode 8: Eagle Eye

Keep your head on a swivel and your screen down. Teach your employees to watch out for shoulder surfing in this WORKed training module.

View More
Antivirus

Antivirus

This video details the threats antivirus software can and cannot mitigate.

View More
Marine Lowlifes: Whaling Shark

Marine Lowlifes: Whaling Shark

The wonders of nature are displayed up close as the Whaling Shark chases its prey, the powerful and important Whale. Teach your employees how to spot and avoid this dangerous attack.

View More
Every Step You Take (Mentoring)

Every Step You Take (Mentoring)

Even after you've learned good security practices, you should share your knowledge with others.

View More
What Is Phishing?

What Is Phishing?

This video explains the concept of phishing and outlines common tactics used by hackers to steal sensitive information.

View More
Need to Know: Working Remotely

Need to Know: Working Remotely

Sometimes, trouble follows you home. Join in as Anthony and Ben explore the dangers of working remotely — from password cracks to malware attacks.

View More
Data Classification (Video)

Data Classification (Video)

This module discusses the importance of data security and how to classify data.

View More
NCSAM Articles

NCSAM Articles

View More
10 Ways to Recognize and Combat Social Engineering

10 Ways to Recognize and Combat Social Engineering

View More
Malware Brief (No Background Music)

Malware Brief (No Background Music)

This module focuses on three key ways to prevent malware infections, details common sources of malware infections and discusses methods to help users avoid unsafe files.

View More
COPPA

COPPA

This module covers the provisions of the Children's Online Privacy Protection Act (COPPA). It outlines when an organization is subject to COPPA requirements, and how to ensure compliance with COPPA provisions.

View More
WORKed Episode 6: Demons

WORKed Episode 6: Demons

A strong team treats office security like they are protecting their castle. From orcs and stuff. Teach your employees how to avoid malware in this WORKed training module.

View More
Posters: APT - Don't Be a Target

Posters: APT - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Common Phishing Attack Types

Common Phishing Attack Types

View More
The Art of Cyber War: Ransomware Attacks

The Art of Cyber War: Ransomware Attacks

Ransomware holds hostage technology and data that is critical for running your most vital operations.

View More
Posters: Encryption - Art of Cyber War

Posters: Encryption - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Introduction to CCPA

Introduction to CCPA

This module is an introduction to the California Consumer Privacy Act, or CCPA.

View More
Poster - NCSAM: Phishing

Poster - NCSAM: Phishing

View More
Poster - NCSAM: Wi-Fi Security

Poster - NCSAM: Wi-Fi Security

View More
Posters: PII - Don't Be a Target

Posters: PII - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Social Engineering for Healthcare Professionals And Providers

Social Engineering for Healthcare Professionals And Providers

Healthcare professionals are targeted by hackers via social engineering. This module will explain social engineering techniques in detail, and review HIPAA requirements regarding external requests for PHI.

View More
CPNI for Consumers Assessment

CPNI for Consumers Assessment

View More
GDPR - Rights of the Data Subjects (Video)

GDPR - Rights of the Data Subjects (Video)

This video explains the rights people have under GDPR when it comes to how their data is stored, processed, and destroyed.

View More
InfosecIQ 12-Month Program Plan

InfosecIQ 12-Month Program Plan

View More
Posters: IPA - Art of Cyber War

Posters: IPA - Art of Cyber War

PDF in two print sizes: -Printshop - Standard Poster -Self Print - Letter

View More
Phishing In Brief

Phishing In Brief

An abbreviated version of our core phishing training, this module will introduce learners to the concept of phishing, teach them how to quickly identify phishing messages and show them how to verify whether or not a message is legitimate.

View More
GDPR - Important Definitions (Video)

GDPR - Important Definitions (Video)

Brief lesson covers the particulars of how GDPR defines data and its uses.

View More
Marine Lowlifes: Spearphish

Marine Lowlifes: Spearphish

Target sighted! Follow the hunt of that vicious but sometimes misaimed predator, the Spearphish.

View More
Spearphishing Assessment

Spearphishing Assessment

View More
Anti-Money Laundering

Anti-Money Laundering

This interactive module explains money laundering and U.S. laws and regulations intended to combat money laundering activities.

View More
Score! (Encryption)

Score! (Encryption)

This module teaches how to prevent interception of your messages.

View More
Infographic - NCSAM: Wi-Fi Security

Infographic - NCSAM: Wi-Fi Security

View More
Posters: Remote Connection - Don't Be a Target

Posters: Remote Connection - Don't Be a Target

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Secure Password Storage

Secure Password Storage

This short video introduces methods employees can use to store passwords securely. Topics include physical security and password storage applications.

View More
Don't Be a Target: Your Email

Don't Be a Target: Your Email

One in 131 emails are malicious, the highest rate in five years. Hackers use email as the primary approach for phishing.

View More
GDPR - Consequences of Non-Compliance

GDPR - Consequences of Non-Compliance

This short video covers the impact non-compliance with GDPR regulations can have on your organization.

View More
Don't Be a Target: Removable Media

Don't Be a Target: Removable Media

hackers steal information from unencrypted, removable media. What's worse is when a hacker plants an infected USB drive for someone to find and use.

View More
Phishing Assessment (LinkedIn)

Phishing Assessment (LinkedIn)

This advanced assessment module will test a learner’s ability to recognize suspicious email elements through a realistic email mimicking LinkedIn communications.

View More
Marine Lowlifes Resource Library

Marine Lowlifes Resource Library

Download the entire library of Marine Lowlifes resources and training materials. Resources include training modules, posters, infographics, email templates, digital banners and a communication plan to help you roll out every step of the campaign.

View More
Mobile Security

Mobile Security

This module identifies security risks resulting from business-based mobile device use in public places and on public networks. It provides suggested mobile device best practices like screen locks, device encryption and Wi-Fi validation.

View More
Personal Information Protection and Electronic Documents Act (PIPEDA)

Personal Information Protection and Electronic Documents Act (PIPEDA)

In this module, learners will cover the scope and uses of PIPEDA and learn to spot possible PIPEDA breaches before they occur.

View More
Cybersecurity Careers

Cybersecurity Careers

This presentation is a quick introduction to the growing field of cybersecurity and how to get started on the path to a cybersecurity job.

View More
Appropriate Use of Software

Appropriate Use of Software

In less than 60 seconds, this module covers how to legally use products of creative software.

View More
Posters: Safe Browsing - Art of Cyber War

Posters: Safe Browsing - Art of Cyber War

PDF in three print sizes: -Printshop - Letter -Printshop - Standard Poster -Self Print - Letter

View More
Don't Be a Target: Your Computer

Don't Be a Target: Your Computer

Your computer is at risk of attacks by hackers using malware, or malicious software, that is intended to steal, damage or control computers and computer systems.

View More
Removable Media Brief Assessment

Removable Media Brief Assessment

View More
Election Security

Election Security

What can you do to prevent election fraud? More than you may think! In one short video, you’ll explore the dos and don’ts of ensuring a safe and secure election process.

View More
EAL Malware

EAL Malware

This module teaches learners how to avoid falling victim to malware.

View More
Malware for Financial Institutions

Malware for Financial Institutions

This interactive module covers malware and the dangers it poses to financial organizations as well as preventative actions.

View More
PHI Definition Assessment

PHI Definition Assessment

View More
Mobile Security for Financial Institutions

Mobile Security for Financial Institutions

This module identifies the security risks financial institutions face from business-based mobile device use, malicious applications designed to attack financial accounts and possible FINRA violations.

View More
Social Engineering for Educators

Social Engineering for Educators

Our Social Engineering module teaches a three-step method to add clarity to a confusing conversation, challenge the other person's identity and verify suspicious requests.

View More
Acceptable Use Policy

Acceptable Use Policy

When you start a new job or enroll in a new school, you’ll often be asked to review and sign an Acceptable Use Policy for the network. Let’s take a quick look at the purpose and contents of an AUP.

View More
Software Licensing

Software Licensing

This brief video covers the appropriate methods for installing and licensing software.

View More
Marine Lowlifes: Clone Phish Infographic

Marine Lowlifes: Clone Phish Infographic

View More
The Art of Cyber War: Data Retention

The Art of Cyber War: Data Retention

Hackers depend on poorly defined data retention policies and bad policy compliance for opportunities to exploit and steal data.

View More
Phishing Foundations

Phishing Foundations

View More
Securing Home Networks and Devices

Securing Home Networks and Devices

This interactive module shows learners how to implement many of the same protections at home that IT staff use at the office.

View More
Removable Media

Removable Media

View More
Introduction to Security Awareness (No Background Music)

Introduction to Security Awareness (No Background Music)

In this module, we’ll jump-start your security awareness training program by demonstrating and reinforcing the critical need for comprehensive cybersecurity programs in the workplace. The module will outline key areas of program focus such as cyber threats (established and emerging), recent attacks and industry regulations, and also position employees as key players in modern cybersecurity initiatives.

View More
GDPR: Consequences of Noncompliance Assessment

GDPR: Consequences of Noncompliance Assessment

View More
The Art of Cyber War: Advanced Persistent Threat

The Art of Cyber War: Advanced Persistent Threat

Hacker's use Advanced Persistent Threats (APT) to access a network and stay undetected.

View More
Share Responsibly

Share Responsibly

This animated module covers the risks involved in oversharing information on social media.

View More
Malware (Without TOC)

Malware (Without TOC)

This interactive module defines malware in common terms and details the dangers it poses to organizations. Practical and applicable preventative actions are summarized in three anti-malware recommendations: avoiding suspicious downloads, attachments and other files, frequent/automated software patches and proper use of anti-virus software.

View More
Working Remotely (Without TOC)

Working Remotely (Without TOC)

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure. Learners will gain deeper understanding of home networks and the devices and risks that come with them, and learn why use of public networks and devices should be avoided when possible.

View More
Phishing Review

Phishing Review

View More
WORKed Episode 7: Laptop Down

WORKed Episode 7: Laptop Down

We’ve got a situation. Well, they do. Show your employees the importance of device security with this WORKed training module.

View More
Removable Media for Financial Institutions

Removable Media for Financial Institutions

This interactive module covers security risks to financial institutions posed by removable media.

View More
Save (Firewall)

Save (Firewall)

This micro-learning module highlights the importance of using firewalls to protect your data.

View More
Breach Notification

Breach Notification

This module details best practices for detecting and reporting unauthorized Protected Health Information (PHI) disclosures. Topics include HIPAA’s definition of a breach, breach disclosure requirements (including the concept of “safe harbor”) and recommended breach detection and notification methods.

View More
What is PHI?

What is PHI?

View More
Protecting Federal Tax Information

Protecting Federal Tax Information

This module provides an overview of federal tax information (FTI), outlines penalties for unauthorized disclosure, and best practices for avoiding unauthorized disclosure.

View More
The Art of Cyber War: Social Engineering

The Art of Cyber War: Social Engineering

Hackers have you unknowingly provide information for use in an attack.

View More
Social Media for Financial Institutions

Social Media for Financial Institutions

This module explains common security risks financial sector employees face when using social media at work, and ways that learners can protect themselves and their company from social media threats.

View More
WORKed Episode 4: Coffee Guy

WORKed Episode 4: Coffee Guy

Watch to discover Charlie’s password to EVERYTHING. Help your employees select strong passwords with this WORKed training module.

View More
PHI Policy Assessment

PHI Policy Assessment

View More
Working Remotely (No Background Music)

Working Remotely (No Background Music)

Designed specifically for remote workers, this interactive module details networking essentials and best security practices to help keep remote personnel secure.

View More
The Art of Cyber War: Malware

The Art of Cyber War: Malware

Your computer is at risk of attacks by hackers using malware, or malicious software, that is intended to steal, damage or control computers and computer systems.

View More
Protecting Mobile Devices Assessment

Protecting Mobile Devices Assessment

View More
Introduction to DFARS Assessment

Introduction to DFARS Assessment

View More
Business Email Compromise Assessment

Business Email Compromise Assessment

View More
Intellectual Property Rights

Intellectual Property Rights

This video delves covers the basics US copyright and trademark laws.

View More
Phishing in Brief Assessment

Phishing in Brief Assessment

View More
Data Security

Data Security

In this module, learners are introduced to the concept of data security, its significance and the risks posed by insecure data handling.

View More