Social engineering is the psychological manipulation of a person to gain information or perform some action. Don’t be fooled! Watch an example of Social Engineering in this related video: Social Engineering – A Short Story
Series: Cyber Awareness Videos
Tired of reading the same stale cyber awareness content? Lacking the time and/or resources to develop and deliver effective security content to your workforce? Strengthen your cybersecurity posture by implementing an ongoing awareness campaign that incorporates short, fresh video content created by the CSIAC.
Each month, the CSIAC will introduce a new video adding another cyber awareness topic to the series. This fresh supply of awareness content will provide organizations with the much needed variety of material to maximize effectiveness. The initial video collection covers the fundamental topics of any awareness campaign, such as phishing, malware, rules for handling PII, and social engineering.
Cybersecurity training efforts are most effective when they can successfully incorporate an element of ongoing awareness. The initial release of 12 videos and the steady supply of new content will help any organization create an ongoing cybersecurity campaign, or complement their existing efforts.
CSIAC releases a new Cyber Awareness Training video on a monthly basis. Subscribe to receive an email notification when new videos are released.
Learn about Personally Identifiable Information (PII). Learn more about PII security awareness by watching this similar video podcast.
An insider threat is a malicious threat to an organization that comes from people within the organization. Learn how to spot some possible indicators of an insider threat.
Learn some helpful tips to make a more secure password.
Avoid falling for phishing attempts with these helpful tips.
What is the difference between a Virus, a Worm, and a Trojan? Don’t know? Find out in this short video.
Handling classified information is a serious responsibility. Are you aware of your obligations in regard to need-to-know information?
Portable devices have blurred the line between technology used for business and technology used for personal matters. End users must learn to apply the same protections to their personal devices in order to help defend and secure the organizations that they work for.
An insider threat is a malicious threat to an organization that comes from people within the organization. Learn how to spot indicators of an insider threat.
Key facts and figures on Bluetooth, and some tips on how maintain a good security posture in a world of increasingly popular Bluetooth devices.