Avoid falling for phishing attempts with these helpful tips.
Series: Cyber Awareness Videos
Tired of reading the same stale cyber awareness content? Lacking the time and/or resources to develop and deliver effective security content to your workforce? Strengthen your cybersecurity posture by implementing an ongoing awareness campaign that incorporates short, fresh video content created by the CSIAC.
Each month, the CSIAC will introduce a new video adding another cyber awareness topic to the series. This fresh supply of awareness content will provide organizations with the much needed variety of material to maximize effectiveness. The initial video collection covers the fundamental topics of any awareness campaign, such as phishing, malware, rules for handling PII, and social engineering.
Cybersecurity training efforts are most effective when they can successfully incorporate an element of ongoing awareness. The initial release of 12 videos and the steady supply of new content will help any organization create an ongoing cybersecurity campaign, or complement their existing efforts.
CSIAC releases a new Cyber Awareness Training video on a monthly basis. Subscribe to receive an email notification when new videos are released.
What is the difference between a Virus, a Worm, and a Trojan? Don't know? Find out in this short video.
Handling classified information is a serious responsibility. Are you aware of your obligations in regard to need-to-know information?
Portable devices have blurred the line between technology used for business and technology used for personal matters. End users must learn to apply the same protections to their personal devices in order to help defend and secure the organizations that they work for.
An insider threat is a malicious threat to an organization that comes from people within the organization. Learn how to spot indicators of an insider threat.
Key facts and figures on Bluetooth, and some tips on how maintain a good security posture in a world of increasingly popular Bluetooth devices.
Ransomware has become one of the fastest growing threats to individuals and businesses around the world. What is it and what can you do to avoid becoming a victim?
General IA information on password and biometrics.
A short story on social engineering and techniques used by social engineers.
One common way malware makes its way into the network.