Fundamental Principles of Security Awareness For Everyone

Fundamental Principles of Security Awareness For Everyone

Each video in the training series is a short animation, filled with colorful characters and graphics, light background music and a professional voiceover. The videos are engaging and informative, with each tackling a different topic in jargon-free language that’s easily understood by a broad audience.

Many of the videos contain a downloadable infographic that summarizes what was learned, allowing viewers to share its valuable advice with family and friends.

Start Course Now

What this course will cover:

The Most Important Lesson In Cybersecurity

1 Min 46 Seconds

But Can’t My Technology Protect Me?

1 Min 34 Seconds

You Are The Number 1 Target

2 Min 41 Seconds

Sensitive Information

3 Min 50 Seconds

A Cyber Criminal’s Best Weapon

3 Min 15 Seconds

Crisis Scams

1 Min 34 Seconds

Smart Home Cybersecurity Checklist

2 Min 28 Seconds

Understanding Malware

3 Min 11 Seconds

Cyberbullying

1 Min 22 Seconds

Mobile Security

2 Min 44 Seconds

Travel Security

3 Min 50 Seconds

Public Wi-Fi

1 Min 57 Seconds

Password Security

2 Min 46 Seconds

Social Media Security

4 Min 30 Seconds

Workspace Security

1 Min 50 Seconds

Web Browsing Security

3 Min 9 Seconds

Fake News

2 Min 52 Seconds

What To Do Next

35 Seconds

Why This Matters

Looking closely at the digital forensics of many breaches, the acquired evidence often points to a similar root cause: People are being deceived into doing things they shouldn’t be doing. Year after year, millions of people simply can’t resist the temptation of clicking on those interesting phishing emails, not to mention a wide range of other cyber no-nos.

It is clear that cyber criminals are hacking people and not technology. Compounding this problem is the tendency people have to leave personal information on social media, which hackers can use against them. The more a hacker knows about a potential victim, the more they can target their attack with a convincing message.

Law Enforcement & This Program

Law Enforcement and This Program

Cybercrime, not unlike traditional crime, can certainly be a costly, unwanted nightmare for organizations and individuals alike. For years now, various law enforcement agencies have been helping educate people on crime prevention by using something called The Crime Triangle.

The Crime Triangle is essentially an equation that identifies three factors involved in a criminal offense. Authorities say that with all of the elements in the crime equation or triangle connected, it’s easier for criminals to commit crime.

The factors of the triangle are: the offender committing the crime; the victim of the crime; and the opportunity or environment for the crime to be committed.

Offender + Victim + Opportunity = Crime

Authorities use this crime equation to illustrate how you can prevent crime by avoiding vulnerable environments and not giving a criminal the opportunity to make you a victim.

Web Safe Inc has adapted The Crime Triangle to create the Cybercrime Equation that’s also used as a powerful learning methodology for their course:

Target + Attack + Vulnerability = Impact

What The Course Will Cover

Target + Attack + Vulnerability = Impact

Target + Attack + Vulnerability = Impact

Backed by the Cybercrime Equation, this course will go into detail about the specifics of a cyber criminal’s target. At the root of it, cyber criminals are targeting sensitive information. This course teaches people how to recognize sensitive information and how to protect it, the foundation to any effective cybersecurity awareness training.

From there, you will learn how to recognize cyber attacks, diving into the type of attacks that are most popular with cyber criminals. You’ll learn not just about the different types of malware, but specifically how cybercriminals use social engineering to play on the emotions of their victims.

You will learn how to spot these attacks and how to avoid them.

Once you understand what cybercriminals are targeting and how they are attacking, you’ll learn where you are most vulnerable to a hacker, like passwords, email, computers, your workspace, public Wi-Fi and so on. And of-course you will learn how to protect yourself in these vulnerable avenues.

Lastly, this course will educate you on what to do if you believe you’ve been impacted by a security incident.

Backed by the Cybercrime Equation, this course will go into detail about the specifics of a hacker’s target. At the root of it, hackers are targeting sensitive information. This course teaches employees how to recognize sensitive information and how to protect it- the foundation to any effective cybersecurity awareness training.

From there, your team will learn how to recognize cyber attacks, diving into the type of attacks that are most popular with hackers. They’ll learn not just about the different types of malware, but specifically how hackers use social engineering to play on the emotions of their victims.  Employees will learn how to spot these attacks and how to avoid them.

Once employees understand what hackers are targeting and how they are targeting potential victims, they’ll learn where they are most vulnerable to a hacker, like passwords, email, computers, the office, public Wi-Fi and so on. Of course they’ll learn how to protect themselves in these vulnerable situations and environments.

Lastly, it’s important to arm your employees with the right tools in the unfortunate event that your company is breached. This course will educate your team on what to do if they believe they’ve been impacted by a security incident and how to report it.

All of the material is easily digested with short, engaging and family-driven content.

Get Access Now!

Get Access Now!

Start Course Now