CyberSafe - Securing Assets for End UsersIdentifying the Need for Security

Identify Security Compliance Requirements

  • Consequences of Non-compliance

Recognize Social Engineering

  • Social Engineering Goals
  • Types of Social Engineering Attacks

Securing Devices

Maintain Physical Security of Devices

  • Digital Breadcrumbs

Use Passwords for Security

  • Two-Step Authentication
  • Password Managers
  • Biometrics

Protect Your Data

  • Data Backup
  • Mobile Device Considerations

Identify and Mitigate Malware

  • Malware Types
  • Malware Sources and Effects

Use Wireless Devices Securely

  • Wi-Fi Security Techniques
  • Organizational and Personal Devices

Using the Internet Securely

Browsing the Web Securely

  • URL Structure
  • HTTP vs. HTTPS
  • Suspicious URL’s

Using Email Securely

  • Email Attachments
  • Common Phishing Techniques

Using Social Networking Securely

  • Common Social Networking Security Risks

Using Cloud Services Securely

  • Cloud Service Risks
  • IoT (Internet of Things) Device Considerations
If you would like more information about scheduling a CyberSafe class for your company, please complete the form below.
One of our representatives will contact you soon.

    Your Name (required)

    Your Email (required)

    Company (required)

    Phone (required)