Cybersecurity and Online Habits
- 22 topics | 58m 12s
- Up to 30 languages
- Transcripts
Sound cybersecurity practices are essential for preventing data breaches and other security incidents that can have devastating consequences for organizations. Employees, through the careful adherence to their company’s IT policies, form an important line of defense against cyberattacks. This course focuses on common pitfalls in IT security by end users and provides employees with common sense guidelines for managing cybersecurity risks. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.
IN THIS COURSE
-
Avoiding Phishing Attacks5m
-
Knowledge Check: Avoiding Phishing Attacks2m
-
Smart Downloading5m
-
Knowledge Check: Smart Downloading1m
-
Using Online Security Features5m
-
Knowledge Check: Using Online Security Features2m
-
Proper Password Management6m
-
Knowledge Check: Proper Password Management1m
-
Proper Use of E-mail3m
-
Knowledge Check: Proper Use of E-mail1m
-
Professional Social Networking4m
-
Knowledge Check: Professional Social Networking1m
-
Using IM and Text Messaging3m
-
Knowledge Check: Using IM and Text Messaging1m
-
The Virtual Meeting – Doing It Right4m
-
Knowledge Check: The Virtual Meeting – Doing It Right1m
-
Blogging2m
-
Knowledge Check: Blogging1m
-
Proper Use of the Internet at Work3m
-
Knowledge Check: Proper Use of the Internet at Work1m
-
Using a Virtual Private Network (VPN)2m
-
Knowledge Check: Using a Virtual Private Network (VPN)1m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
GDPR Short: Selling or Sharing Data (UK)
COMPLIANCE-COURSE
Supply Chain Short: Supply Chain Due Diligence
COMPLIANCE-COURSE
Cybersecurity Short: Proper Use of E-mail