Fundamental Principles of Security Awareness For Everyone
Fundamental Principles of Security Awareness For Everyone
Each video in the training series is a short animation, filled with colorful characters and graphics, light background music and a professional voiceover. The videos are engaging and informative, with each tackling a different topic in jargon-free language that’s easily understood by a broad audience.
Many of the videos contain a downloadable infographic that summarizes what was learned, allowing viewers to share its valuable advice with family and friends.
What this course will cover:
The Most Important Lesson In Cybersecurity
1 Min 46 Seconds
But Can’t My Technology Protect Me?
1 Min 34 Seconds
You Are The Number 1 Target
2 Min 41 Seconds
Sensitive Information
3 Min 50 Seconds
A Cyber Criminal’s Best Weapon
3 Min 15 Seconds
Crisis Scams
1 Min 34 Seconds
Smart Home Cybersecurity Checklist
2 Min 28 Seconds
Understanding Malware
3 Min 11 Seconds
Cyberbullying
1 Min 22 Seconds
Mobile Security
2 Min 44 Seconds
Travel Security
3 Min 50 Seconds
Public Wi-Fi
1 Min 57 Seconds
Password Security
2 Min 46 Seconds
Social Media Security
4 Min 30 Seconds
Workspace Security
1 Min 50 Seconds
Web Browsing Security
3 Min 9 Seconds
Fake News
2 Min 52 Seconds
What To Do Next
35 Seconds
Why This Matters
Looking closely at the digital forensics of many breaches, the acquired evidence often points to a similar root cause: People are being deceived into doing things they shouldn’t be doing. Year after year, millions of people simply can’t resist the temptation of clicking on those interesting phishing emails, not to mention a wide range of other cyber no-nos.
It is clear that cyber criminals are hacking people and not technology. Compounding this problem is the tendency people have to leave personal information on social media, which hackers can use against them. The more a hacker knows about a potential victim, the more they can target their attack with a convincing message.
Law Enforcement & This Program
Law Enforcement and This Program
Cybercrime, not unlike traditional crime, can certainly be a costly, unwanted nightmare for organizations and individuals alike. For years now, various law enforcement agencies have been helping educate people on crime prevention by using something called The Crime Triangle.
The Crime Triangle is essentially an equation that identifies three factors involved in a criminal offense. Authorities say that with all of the elements in the crime equation or triangle connected, it’s easier for criminals to commit crime.
The factors of the triangle are: the offender committing the crime; the victim of the crime; and the opportunity or environment for the crime to be committed.
Offender + Victim + Opportunity = Crime
Authorities use this crime equation to illustrate how you can prevent crime by avoiding vulnerable environments and not giving a criminal the opportunity to make you a victim.
Web Safe Inc has adapted The Crime Triangle to create the Cybercrime Equation that’s also used as a powerful learning methodology for their course:
Target + Attack + Vulnerability = Impact
What The Course Will Cover
Target + Attack + Vulnerability = Impact
Target + Attack + Vulnerability = Impact
Backed by the Cybercrime Equation, this course will go into detail about the specifics of a cyber criminal’s target. At the root of it, cyber criminals are targeting sensitive information. This course teaches people how to recognize sensitive information and how to protect it, the foundation to any effective cybersecurity awareness training.
From there, you will learn how to recognize cyber attacks, diving into the type of attacks that are most popular with cyber criminals. You’ll learn not just about the different types of malware, but specifically how cybercriminals use social engineering to play on the emotions of their victims.
You will learn how to spot these attacks and how to avoid them.
Once you understand what cybercriminals are targeting and how they are attacking, you’ll learn where you are most vulnerable to a hacker, like passwords, email, computers, your workspace, public Wi-Fi and so on. And of-course you will learn how to protect yourself in these vulnerable avenues.
Lastly, this course will educate you on what to do if you believe you’ve been impacted by a security incident.
Backed by the Cybercrime Equation, this course will go into detail about the specifics of a hacker’s target. At the root of it, hackers are targeting sensitive information. This course teaches employees how to recognize sensitive information and how to protect it- the foundation to any effective cybersecurity awareness training.
From there, your team will learn how to recognize cyber attacks, diving into the type of attacks that are most popular with hackers. They’ll learn not just about the different types of malware, but specifically how hackers use social engineering to play on the emotions of their victims. Employees will learn how to spot these attacks and how to avoid them.
Once employees understand what hackers are targeting and how they are targeting potential victims, they’ll learn where they are most vulnerable to a hacker, like passwords, email, computers, the office, public Wi-Fi and so on. Of course they’ll learn how to protect themselves in these vulnerable situations and environments.
Lastly, it’s important to arm your employees with the right tools in the unfortunate event that your company is breached. This course will educate your team on what to do if they believe they’ve been impacted by a security incident and how to report it.
All of the material is easily digested with short, engaging and family-driven content.