Avoiding the Scam! I’ve Got a Favor to Ask

Cybersecurity Situations & Awareness

Unless we're really careful - and follow our cyber security policies and procedures - emails can get us into real trouble (and lead to serious financial loss). Policies are in place to protect you... and the organization. When it comes to hacks and scams, following those procedures can mean the difference between catching a scam or losing thousands (if not millions) of dollars.

Learning Paths & Details

Competencies

  • Developing Critical Work Skills
  • Developing High-Performing Work Habits
  • Managing Risk

Buying Options

Library License

You may license this resource or the entire video library. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

Streaming License

You may license this resource as a streaming video. Please contact your sales representative for cost-effective license pricing. Enterprise licensing also available.
Sign In to Request Quote

USB Key (3-Year License) $1,595.00

Secure USB must be seated in computer in order to run. Content can't be copied or downloaded. License fee allows access to content for three years. Any discussion/workshop materials will be delivered via email.
USB Keys: 

Also Available as: eLearning - Signature

Cyber Security Essentials: Stop. Think. Ask.™

Cyber Security Essentials: Stop. Think. Ask.™

Cybersecurity is the practice of protecting systems, networks, programs, devices and data from cyber-attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. By understanding terminology, possible targets and the consequences of cyber-attacks, we can all minimize the potential impacts, gain value in your cybersecurity efforts, and even prevent future attacks.

Training Files (8)

TitleTypeTime/PagesLanguage
Avoiding the Scam! I’ve Got a Favor to Ask
Video with graphics and narrator
Video Vignette03:09 min EnglishDemo
Workshop Material4 pages EnglishDemo
Workshop Material2 pages EnglishDemo

Additional Information

Here are some other things to consider when dealing with possible scams:

  • While you can’t control whether an email address has been hacked, you should use proven processes to ensure and verify the validity of high-dollar requests. Additional verification would have revealed that the client did not actually request that funds be transferred.
  • Question email requests to transfer money that also say the sender will be unavailable for a period of time to confirm the transaction. Fraudsters depend on speed, and count on employees to not think too much about an individual transaction.
  • Follow procedures. You should try to verify the accuracy of any request to transfer money or personally identifiable information (PII) by phone or email.

More From the Series: Avoiding the Scam! Understanding Your Role in Cybersecurity™


Related Programs & Training Ideas