There are a number of different methods that the bad guys can use to attack your systems. In this video, you’ll learn how to recognize and protect yourself from the most well-known security threats.
These days, the bad guys know that the management of the company is the one with the money and the power. In this video, you’ll learn about techniques that the bad guys use for hunting the big whale.
Why would the bad guys hack into your computer when they could just give you a call? In this video, you’ll learn about vishing (voice phishing), and how the bad guys can even fool you into calling them yourself.
The bad guys know that the easiest way to steal your information is to have you type it in for them yourself. In this video, you’ll learn how phishing happens and things you can do to protect against phishing and spear phishing.
The bad guys are very good at providing fake information to us. In this video, you’ll learn how spoofing works and how pharming and phishing have become common ways to illicitly obtain our private information.
Which of these would be a characteristic of a phishing attack?
There are many security threats constantly attacking our computers and our data. In this video, you’ll learn about social engineering, shoulder surfing, malware, rootkits, and much more.
When training your end user community, there are a number of security concerns that must be considered. In this video, you’ll learn which user habits, threat prevention techniques, and business policies should be implemented to keep everyone’s data as safe as possible.
One of the most trusted forms of communication is the telephone, and the bad guys are very good at taking advantage of our phones. In this video, you’ll learn about common vishing techniques and how you can prevent vishing.
The bad guys know that your executives often have the keys to the kingdom. In this video, you’ll learn about whaling and things you can do to help prevent your upper management from the phishers and hackers.