The Federal Trade Commission (FTC) estimates that recovering from identity theft takes an average of 6 months and 200 hours of work. In this program, we’ll cover a system that helps you set unique passwords for each site. We’ll also discuss some additional tips for making your passwords more creative.
To help prevent a cyberattack, it’s good to have an understanding of what’s out there and how they get into your system. This course will walk viewers through the many types of malware including adware, bots, ransomware, rootkits, spyware, Trojan malware, computer viruses, and worms.
It’s hard to have a conversation about cybersecurity without throwing around a lot of jargon, so in this course we’re going to break down some common cybersecurity terms. We’ll define cyberspace, cybersecurity, cybercrime, cyberterrorism, and other familiar terms.
You’ve likely received phishing emails. They’re the emails that bait you to click on them. In this course, we’ll discuss why phishing emails are so successful, what you should do if you suspect you’ve received a phishing email, and the steps to take if you inadvertently click on a link.
Training your employees on cybersecurity is critical in this age of online everything. All employees access various online systems and applications to handle their daily tasks. Customer service, order entry, inventory management, accounting, payroll
In addition, employees may surf the web for personal use, exposing their work computer to additional risks. If they click on a phishing email link from their personal email, they may be exposed to malware risks and identity theft.
You can sample our cybersecurity videos above, or sign up for a free trial and get full access to Thinkzoom, our learning management system. See for yourself how easy it is to access our training from anywhere, anytime. As you sample the courses you can access our student materials, enroll nine additional users and even record your own video with our award-winning authoring tool.
Our comprehensive library includes other topics such as:
Technology evolves quickly and so do cybercriminals. Your cybersecurity training needs to evolve too! Check out our blog post for some tips on how to create a cybersecurity training program.
Does buying content for your LMS seem like a daunting task? It doesn't have to be. Check out our blog to learn how you can buy eLearning content for your LMS and not regret it later.
Are you a manager looking for staff training ideas for a specific team member? Or are you a training or HR leader looking to expand on your employee training and development program? Hopefully, these stories from our clients will help you spice up your staff training.