Cybersecurity Short: Proper Use of E-mail
- 2 topics | 4m 12s
- Up to 30 languages
- Transcripts
E-mail is the most common form of business communication today, yet it's also the easiest way hackers gain access and compromise company systems and networks. This course covers key best practices for safe e-mail use, so that you can mitigate, rather than introduce, security risks to your company's assets. This course was developed with subject matter support provided by The Potomac Law Group, PLLC. Please note, however, that the course materials and content are for informational purposes only and do not constitute legal advice and may or may not reflect the most current legal developments. Nothing herein, or in the course materials, shall be construed as professional advice as to any particular situation or constitute a legal opinion with respect to compliance with legal statutes or statutory instruments. Transmission of the information is not intended to create, and receipt does not constitute, an attorney-client relationship. Readers should not act upon this information without seeking independent legal advice.
IN THIS COURSE
-
Proper Use of E-mail3m
-
Knowledge Check: Proper Use of E-mail1m
YOU MIGHT ALSO LIKE
COMPLIANCE-COURSE
COMPLIANCE SHORT: Combating Modern Slavery
COMPLIANCE-COURSE
COMPLIANCE SHORT: Privacy and Information Security
COMPLIANCE-COURSE
Compliance AI Short: Recency, Delusions, and Accuracy of Information