Cybersecurity and Online Habits

  • 22 topics | 58m 12s
  • Up to 30 languages
  • Transcripts
Sound cybersecurity practices are essential for preventing data breaches and other security incidents that can have devastating consequences for organizations. Employees, through the careful adherence to their company’s IT policies, form an important line of defense against cyberattacks. This course focuses on common pitfalls in IT security by end users and provides employees with common sense guidelines for managing cybersecurity risks. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.

WHAT YOU WILL LEARN

  • follow best practices to avoid falling victim to phishing attacks
  • Knowledge Check: Avoiding Phishing Attacks
  • identify techniques to reduce risks when downloading software
  • Knowledge Check: Smart Downloading
  • identify best practices for using online security features
  • Knowledge Check: Using Online Security Features
  • identify best practices for creating and managing passwords
  • Knowledge Check: Proper Password Management
  • identify safe e-mail practices
  • Knowledge Check: Proper Use of E-mail
  • identify best practices for safe social networking in a professional context
  • Knowledge Check: Professional Social Networking
  • recognize best practices for communicating through IM and text messaging
  • Knowledge Check: Using IM and Text Messaging
  • identify safe practices for using virtual meeting applications
  • Knowledge Check: The Virtual Meeting – Doing It Right
  • identify actions you can take to avoid blogging-related risks
  • Knowledge Check: Blogging
  • identify best practices for safe Internet use at work
  • Knowledge Check: Proper Use of the Internet at Work
  • identify characteristics of VPNs
  • Knowledge Check: Using a Virtual Private Network (VPN)

IN THIS COURSE

  • Avoiding Phishing Attacks
    5m
  • Knowledge Check: Avoiding Phishing Attacks
    2m
  • Smart Downloading
    5m
  • Knowledge Check: Smart Downloading
    1m
  • Using Online Security Features
    5m
  • Knowledge Check: Using Online Security Features
    2m
  • Proper Password Management
    6m
  • Knowledge Check: Proper Password Management
    1m
  • Proper Use of E-mail
    3m
  • Knowledge Check: Proper Use of E-mail
    1m
  • Professional Social Networking
    4m
  • Knowledge Check: Professional Social Networking
    1m
  • Using IM and Text Messaging
    3m
  • Knowledge Check: Using IM and Text Messaging
    1m
  • The Virtual Meeting – Doing It Right
    4m
  • Knowledge Check: The Virtual Meeting – Doing It Right
    1m
  • Blogging
    2m
  • Knowledge Check: Blogging
    1m
  • Proper Use of the Internet at Work
    3m
  • Knowledge Check: Proper Use of the Internet at Work
    1m
  • Using a Virtual Private Network (VPN)
    2m
  • Knowledge Check: Using a Virtual Private Network (VPN)
    1m