Cyber What?

Importance of Securing System Passwords/Information

Sensitive information left out on a desk can easily be taken by thieving hands and seen by prying eyes. All sensitive and confidential information should be securely stored – especially things like system passwords. The bottom line is simple. You need to know and follow the organization’s secure/sensitive information policies and procedures – especially when it comes to passwords. Cybersecurity policies are not to be taken lightly.

Learning Path & Details

Competencies

  • Demonstrating Integrity & Professionalism
  • Ensuring Professional and Compliant Behavior

Buying Options

Library License

You may license this resource or the entire video library. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

Streaming License

You may license this resource as a streaming video. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

USB Key (3-Year License) $1,595.00

Secure USB must be seated in computer in order to run. Content can't be copied or downloaded. License fee allows access to content for three years. Any discussion/workshop materials will be delivered via email.
USB Keys: 

Also Available as: eLearning - Signature

A.C.T. with Integrity™ Real Situations for Discussion (eLearning Course)

A.C.T. with Integrity™ Real Situations for Discussion (eLearning Course)

Equip employees to make the right choices in tough ethical situations. This updated eLearning course will help your employees learn how to recognize the most common business ethics and compliance situations they face every day. It provides a clear, easy-to-use model that will help them think things through to arrive at the most appropriate choice of action to take, ensuring the integrity of your organization.

Training Files (18)

TitleTypeTime/PagesLanguage
A.C.T. with Integrity™ - Cyber What?
Video with graphics and narrator
Video Vignette01:16 min EnglishDemo
Video Vignette00:41 min EnglishDemo
Conflict of Interest
Video Discussion Questions
Workshop Material2 pages EnglishDemo
Workshop Material8 pages EnglishDemo

Additional Information

Passwords are vital to system security. If left out and open to prying eyes, systems can be compromised. Data leaked or stolen. Malware and other adverse software could be loaded/installed onto organizational systems.


More From the Series: A.C.T. with Integrity: Real Situations for Discussions™


Related Programs & Training Ideas