Quick view Security Awareness – A Day in the Life With nearly 2 million data records stolen each day and sophisticated threats emerging at an alarming rate, it is imperative that we arm ourselves with the information needed to detect, defend and respond to information security threats as they arise. In... View Details
Quick view USB Baiting: Don't Take the Bait Compromised USB drives can be used to inject malicious code, redirect you to phishing websites, or give a hacker remote access to your computer. In this video, an employee is faced with a decision that could ultimately decide the fate of his organization... View Details
Quick view Typosquatting Cybersquatters are counting on you to make a typing error that leads you to a bogus site. The attack is called typosquatting and it’s an emerging threat that can yield big returns in more ways than you might think. Watch the video to find out what... View Details
Quick view The In-Personator: A Social Engineering Threat Social engineers prepare themselves by thoroughly researching their targets before launching an in-person attack. They will often go as far as disguising themselves as a repair person, or maybe even impersonating a uniformed worker. Although social... View Details
Quick view How to Defeat Social Engineers Social engineers use deception to manipulate people into divulging confidential or personal information that may be used for fraudulent purposes. And you could be their next target. Protect yourself from a social engineering attack by applying the... View Details
Quick view Tales From CPU City™ (Episode 2) - Tailgating In this episode, Private File uncovers an evil physical security plot that releases mayhem upon our beloved CPU City. Learn how the plot unfolds and what strategies can be used to combat the menacing physical threat we call tailgating. Topics: How... View Details
Quick view Dial V for Vishing In this episode, Private File uncovers an evil physical security plot that releases mayhem upon our beloved CPU City. Learn how the plot unfolds and what strategies can be used to combat the menacing physical threat we call tailgating. ... View Details
Quick view SMiShed! Inspired by true events, SMiShed! recalls a recent SMS phishing (or SMiShing) attack that scammed several bank customers out of tens of thousands of dollars. By applying the best practices outlined in this Microlearning video, you can avoid being... View Details
Quick view Living Mobile Secure Attacks on mobile devices, mobile apps, and mobile carriers are rising fast. How can you ensure your device is secure? What happens if your phone or tablet is breached? Watch this video to learn more about what you can do to help protect yourself from... View Details
Quick view Home Invasion: The Internet of Terrors? It is projected that by 2025, there will be over 75 billion “things” connected to the Internet, otherwise known as the Internet of Things (IoT). Such massive connectivity will make life much more convenient for you, but potentially for... View Details
Quick view Evil Twin An “Evil Twin” is a technique hackers use gain to access your information through phony Wi-Fi access points that appears to be legitimate. Evil Twins can be difficult to spot because they often have names very similar to authentic access... View Details
Quick view Deepfakes What do you get when you mix publicly available media with technology such as machine learning? Well, cybercriminals are using this recipe to defraud victims, assist in their social engineering efforts, generate fake news, and spread false information... View Details