There are a number of different methods that the bad guys can use to attack your systems. In this video, you’ll learn how to recognize and protect yourself from the most well-known security threats.
Once you’re inside of a building, the security posture of an organization is dramatically decreased. In this video, you’ll learn how the bad guys can get into your secure building without being noticed.
How are your users handling the organization’s data? In this video, you’ll learn some techniques for maintaining good data hygiene for your entire user base.
We often think of network security as bits and bytes, but a large part of technology security exists in the physical world. In this video, you’ll learn about hardware locks, tailgating, shoulder surfing, shredding, and more.
Who’s coming into your building without your knowledge? In this video, you’ll learn how tailgating can be used to gain access to secure areas and what you can do to prevent it.