Training Curriculum Topics
-
AI (Artificial Intelligence)
This episode explores AI influences, focusing on understanding how technologies such as ChatGPT can impact cyber security. This includes recognizing potential risks associated with AI-based systems and understanding AI-driven attacks (e.g., AI-generated phishing emails).
-
Banking
Banks are essential in keeping your business running. Cyber criminals are after your money, so it is important to understand how to keep your money safe and protect yourself and your business.
-
Cloud Security
Cloud security is like a virtual fortress, safeguarding data stored or processed in the cloud. In this episode, discover the importance of robust cloud security measures in protecting against unauthorized access, data breaches, and ensuring the integrity of your data. Learn how cloud security enhances the overall safety of online operations, secures sensitive information, and helps builds trust in your business.
-
Compliance
Compliance with relevant regulations, such as data protection and privacy laws, is essential for small businesses. This episode helps owners understand their legal obligations and how to avoid penalties. We cover the importance of adhering to relevant cybersecurity laws, regulations, and standards in regulated environments.
-
Cookies
Cookies are small text files stored on a user's device when a website is visited. They serve various purposes, including session management and personalization. This episode educates people about what cookies are, their functionalities, and potential privacy implications. It emphasizes how managing cookie settings can help keep your information secure.
-
Cryptocurrency
Cryptocurrency comes with a variety of risks, such as potential vulnerabilities associated with digital currencies and blockchain technology. Cryptocurrency wallets and exchanges are discussed so that you can make an informed decision on if investing in cryptocurrency is the right choice for you.
-
Data Backup and Recovery
In this episode we cover the crucial role of backing up data to prevent loss and ensure business continuity. Explore how reliable backup and recovery strategies safeguard against data disasters, system failures, and cyber threats. Learn why having a solid backup plan is essential for maintaining the integrity of critical information and minimizing downtime in the face of unforeseen events.
-
Encryption
Encryption is a digital lock for data, keeping it secure during transmission or storage. This training video highlights its vital role in protecting sensitive information and ensuring privacy. Learn how encryption transforms data into an unreadable format, safeguarding digital communication, financial transactions, and confidential files.
-
File Sharing
File Sharing is the backbone of digital collaboration highway, and in this episode you will discover the crucial elements of secure file sharing. Explore the importance of encryption, access controls, and secure platforms in safeguarding shared information. Learn how to strike a balance between convenience and security while ensuring the confidentiality and integrity of shared files.
-
Incident Response
In this episode we delve into the importance of swift and effective incident response strategies. Understand the crucial role incident response plays in minimizing damage, preserving data integrity, and fortifying overall cybersecurity defenses. Equip yourself with the knowledge needed to navigate and mitigate the impact of security incidents in a rapidly evolving threat landscape.
-
IoT (Internet of Things)
IoT security covers the protection of Internet of Things devices, such as smart home devices or smart watches. This episode highlights the risks associated with insecure IoT devices, provides guidelines for securing them, and emphasizes the importance of keeping firmware and software up to date to prevent unauthorized access or exploitation.
-
Multi-Factor Authentication
Multi-factor authentication (MFA) is a security mechanism that requires users to provide two or more forms of authentication to verify their identity. This episode emphasizes the importance of using this additional layer of security, enabling users to better protect their accounts and systems against unauthorized access and identity theft.
-
Password Re-Use
Passwords re-use refers to the practice of using the same password across multiple accounts or systems. This practice poses a significant security risk, as a compromised password from one account can potentially grant unauthorized access to other accounts or systems. This episode emphasizes the importance of using unique, strong passwords for each account to prevent unauthorized.
-
Physical Security
Don't overlook physical security measures, such as securing your premises and restricting access to sensitive areas. Physical security can present just as much risk as cybersecurity and here we learn of some of the more common areas to focus on.
-
Ransomware
Ransomware attacks have become increasingly prevalent, with phishing being a common entry point. This episode covers ways to recognize these types of attacks and how your response plays a large role in the future of your business.
-
Social Engineering
Social Engineering is one of, if not the most common and successful type of cyber-attack out there today. This episode raises awareness about common tactics used by attackers, helps users recognize warning signs, and provides strategies to mitigate the risk of falling victim to social engineering attacks.
-
Social Media Risks
Social media platforms present various security risks, including identity theft and exposure to malicious content. This episode raises awareness of privacy settings, safe sharing practices, recognizing and avoiding scams or fake accounts, and protecting personal information on social media platforms.
-
Spam and Phishing
Spam refers to unsolicited and often unwanted email messages, while phishing refers to fraudulent attempts to deceive individuals into sharing sensitive information. This episode educates people on identifying and avoiding suspicious email messages and recognizing phishing techniques to help safeguard personal and sensitive information.
-
Third Party Risks
This episode addresses the cyber risks associated with both being a vendor and using vendors to help run your business. Understanding and managing vendor risks is crucial to maintaining the security of your overall business ecosystem.
-
VPN Security
A VPN (Virtual Private Network) is a technology that enables secure and private communication over public networks. This episode helps people understand the benefits of using secure VPNs when connecting trough public networks or accessing sensitive information remotely.
-
Vulnerabilities
Vulnerabilities refer to weaknesses or flaws in systems, applications, or networks that can be exploited by attackers. This episode covers best practices for helping to ensure your systems are kept up to date and secure.
-
Web App Security
This episode explores the pivotal role of web application security in safeguarding against cyber-attacks, ensuring data integrity, and protecting user privacy. Discover how preventing unauthorized access and using only secure web applications can help protect your business.
-
Wireless Security
Wireless networks can be vulnerable to security risks if not properly secured. This episode focuses on best practices for securing wireless networks to help protect against unauthorized access, data interception, and other wireless-related threats.
-
Working Remote
Working Remote is the new professional landscape, and this episode guides you through essential practices for success. Explore the importance of secure connections and physical security to equip yourself with the skills needed to thrive in this new normal.