Employee Security Awareness Training - DEMO

Importance of Security Awareness Demo

Importance of Security Awareness - Video

Watch Video, then Proceed By Selecting "Next".

Importance of Security Awareness

Why is Security Awareness so Important?

Imagine a modern Cybersecurity attack - do you think of a computer hacker hammering away commands on a keyboard? Well, that's not how it happens these days.

This course covers multiple types of intrusions and how they can be prevented. These types of intrusions do not just occur over the internet - but may occur over the phone, email, or even in person.

Considering all types of possible intrusion is important to minimize criminal access to your information.

Without physical security, no software patch, antivirus software, or firewall will prevent a hacker from walking right in the front door to steal sensitive corporate information.

This course will make you aware of the various attacks that criminals use to obtain user id's, passwords, trade secrets, financial reports, customer data, or other sensitive information.

But keep in mind, not all criminals want your information. They may want to simply disrupt business by inflicting damage.

Social Engineering Awareness Demo

What is Social Engineering?

What is Social Engineering?

Social Engineering refers to the psychological manipulation of people to perform actions or divulge confidential information.

Social Engineers do not have to be technically skilled - this type of crime requires a creative and ingenious person to trick their victims. A Social Engineer often appears as someone you can trust - a fellow worker over social media, maintenance person, or even a worker from the IT department. 

What are they out for? Often it's sensitive information that the attacker can sell. But an attacker may desire to just disrupt business operations.

Sixty percent of enterprises have fallen victim to social engineering in 2016 - these incidents cost companies anywhere between thousands to millions of dollars each.

-Source: Agari

Social Engineering Quiz

  • Phishing
    The general act of when cybercriminals attempt to steal information often through phone, email, or website.
  • Vishing
    The attacker contacts you by phone in the attempt to gain access or information.
  • Pretexting
    The criminal act of impersonating another person for criminal gain.
  • Baiting
    A common method for this attack involves the hacker leaving USB drives in a public location.

Physical Security Demo

Importance of Physical Security

Be Aware of Physical Security Vulnerabilities.

Physical Security is usually a second thought to most companies which opens many opportunities for possible intrusion. This lack of security often occurs because IT focuses on cybersecurity countermeasures and not physical security.

Physical Security protects people, sensitive information, inventory, equipment,  and much more..

Without physical security, no software patch, antivirus software, or firewall will deter an attacker from entering your facility with the intent to steal sensitive corporate information, or harm your day-to-day operations.

Methods of Breach - Waste Disposal

Destroy Sensitive Documents!

Be careful not to dispose of sensitive documents in public areas or in general trash bins. These documents will most likely be retrieved by cleaning crews and disposed of in an unsecured location.

Attackers commonly seek out information using a method known as dumpster diving - so do not dispose of sensitive documents without either cross shredding them first, or disposing them in a secured bin intended for destruction by a third party company.

Trash or Shred?

Drag the items below where they belong! Either the Trash or Shredder.

  • Travel Receipts
  • Dinner Recipes

Computer Security Awareness Demo

Methods of Breach - Mobile Computing

Mobile Computing Risks

Public WiFi has a tremendous number of risks associated with it. Chances are, security on these networks are non-existent. Assume all information transferred over public WiFi can be captured by nearby attackers in plain text. It's never a good practice to send sensitive emails, perform online banking, or anything do anything where security is expected while on public wifi.

Malicious Hotspots

Malicious Hotspots are setup by the attacker to intercept all your traffic while you browse. These are typically named "Free WiFi", "Free Internet", and are not safe to use. If you have tethering abilities on your phone, that is your best bet for a secure wireless connection.

Importance of Security Awareness Quiz

Is it acceptable to use the same strong password on multiple platforms?

  • Yes
  • No