Avoiding the Scam! Better Act Fast!

Cybersecurity Situations & Awareness

Fraudsters have a huge toolkit of tricks to pull from. Let's take a case of social engineering – also known as phishing. Hackers can take advantage of the fact that a company is engaged in a merger and/or acquisition, and can target employees who are responsible for personally identifiable information with emails that appeared to be from others within the organization. It happens all the time... especially when policies and procedures are not followed.

Learning Path & Details

Competencies

  • Developing Critical Work Skills
  • Developing High-Performing Work Habits
  • Managing Risk

Buying Options

Library License

You may license this resource or the entire video library. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

Streaming License

You may license this resource as a streaming video. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

USB Key (3-Year License) $1,595.00

Secure USB must be seated in computer in order to run. Content can't be copied or downloaded. License fee allows access to content for three years. Any discussion/workshop materials will be delivered via email.
USB Keys: 

Also Available as: eLearning - Signature

Cyber Security Essentials: Stop. Think. Ask.™

Cyber Security Essentials: Stop. Think. Ask.™

Cybersecurity is the practice of protecting systems, networks, programs, devices and data from cyber-attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. By understanding terminology, possible targets and the consequences of cyber-attacks, we can all minimize the potential impacts, gain value in your cybersecurity efforts, and even prevent future attacks.

Training Files (8)

TitleTypeTime/PagesLanguage
Avoiding the Scam! Better Act Fast
Video with graphics and narrator
Video Vignette03:56 min EnglishDemo
Workshop Material4 pages EnglishDemo
Avoiding the Scam! Better Act Fast
Video Discussion Questions
Workshop Material3 pages EnglishDemo

Additional Information

The situation presented in this video (as well as the information the fraudster shares before and after the cybersecurity lapse) supplements your company’s technology-facing approach to cybersecurity. It reinforces good habits by showing the true consequences of bad cybersecurity choices.

When it comes to email scams, you won't believe how quickly a scammer is able to get that information out of an employee - even those who are trained to be suspicious. Email scams are one of the biggest threats to an organization's cyber security. Following policies and procedures regarding personally identifiable information are paramount for keeping fraudsters at bay - and your organization out of trouble.


More From the Series: Avoiding the Scam! Understanding Your Role in Cybersecurity™


Related Programs & Training Ideas