Search Video Library (7 Assets Found)

Results for Topic: Cybersecurity

Avoiding the Scam! Understanding Your Role in Cybersecurity

Cybersecurity is serious business. Millions of dollars are lost each day to cyber crime. Sometimes you hear about it in the news… most of the time you don’t. The four dramatic situations (and information) presented in Avoiding the Scam! tackle the most common gap companies often face in the war against cyber-attacks... the human factor.

#1 ID:2578
Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Off-The-Shelf Video Program (ILT) Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Workplace Safety & Awareness, Learning Reinforcement Closed Captioned

Avoiding the Scam! Better Act Fast!

Fraudsters have a huge toolkit of tricks to pull from. Let's take a case of social engineering – also known as phishing. Hackers can take advantage of the fact that a company is engaged in a merger and/or acquisition, and can target employees who are responsible for personally identifiable information with emails that appeared to be from others within the organization. It happens all the time... especially when policies and procedures are not followed.

#2 ID:2579
Topic: Cybersecurity Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned

Avoiding the Scam! I’ve Got a Favor to Ask

Unless we're really careful - and follow our cyber security policies and procedures - emails can get us into real trouble (and lead to serious financial loss). Policies are in place to protect you... and the organization. When it comes to hacks and scams, following those procedures can mean the difference between catching a scam or losing thousands (if not millions) of dollars.

#3 ID:2580
Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned

Avoiding the Scam! One Bad Transfer

It's important not to skip processes or procedures when dealing with wire transfers, invoice payments and personally identifiable information. It only takes one missed step in the process to cause lots of financial devastation within an organization. And... Never. Ever. Share system passwords with other employees. That's just an big accident waiting to happen!

#4 ID:2581
Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned

Avoiding the Scam! They Needed My Help

We all want to help our customers or vendors... but a fake email (or an unconfirmed phone call) can get the organization into some real trouble. It only takes one missed step in the process to cause lots of financial devastation. Cyber attacks are increasing each and every day. If your employees don't know how to spot a bad email - or more importantly - ignore organizational policies and procedures when it comes to security, chances are, you're going to get scammed.

#5 ID:2582
Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Learning Reinforcement Closed Captioned

Cyber What?

Sensitive information left out on a desk can easily be taken by thieving hands and seen by prying eyes. All sensitive and confidential information should be securely stored – especially things like system passwords. The bottom line is simple. You need to know and follow the organization’s secure/sensitive information policies and procedures – especially when it comes to passwords. Cybersecurity policies are not to be taken lightly.

#6 ID:2610
Topic: Ethics & Integrity Learning Path: Ethics & Compliance Type: Video Vignettes Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Compliance, Cybersecurity Closed Captioned
Discussion Card: Avoiding the Scam! Knowing Your Role in Cybersecurity™

Discussion Card: Avoiding the Scam! Knowing Your Role in Cybersecurity

When it comes to cybersecurity, you're only as secure as your employee's knowledge and actions. These easy-to-use cards provide a simple model (S.C.A.M.) along with thought-provoking questions on the importance of understanding and following cybersecurity policies and procedures. These cards are great for a quick training reminder, reinforcement or as a conversation generator.

#7 ID:2577
Topic: Cybersecurity Learning Paths: Ethics & Compliance, Personal Performance Type: Discussion Cards Suggested Industry Usage: Healthcare, Industrial & Manufacturing, Office & General, Retail & Hospitality, Government Other Topics: Learning Reinforcement