Security First Elite Solution

  • Security Awareness – A Day in the Life

    Security Awareness – A Day in the Life

    With nearly 2 million data records stolen each day and sophisticated threats emerging at an alarming rate, it is imperative that we arm ourselves with the information needed to detect, defend and respond to information security threats as they arise. In...

  • USB Baiting: Don't Take the Bait

    USB Baiting: Don't Take the Bait

    Compromised USB drives can be used to inject malicious code, redirect you to phishing websites, or give a hacker remote access to your computer. In this video, an employee is faced with a decision that could ultimately decide the fate of his organization...

  • Typosquatting

    Typosquatting

    Cybersquatters are counting on you to make a typing error that leads you to a bogus site. The attack is called typosquatting and it’s an emerging threat that can yield big returns in more ways than you might think. Watch the video to find out what...

  • The In-Personator: A Social Engineering Threat

    The In-Personator: A Social Engineering Threat

    Social engineers prepare themselves by thoroughly researching their targets before launching an in-person attack. They will often go as far as disguising themselves as a repair person, or maybe even impersonating a uniformed worker. Although social...

  • How to Defeat Social Engineers

    How to Defeat Social Engineers

    Social engineers use deception to manipulate people into divulging confidential or personal information that may be used for fraudulent purposes. And you could be their next target. Protect yourself from a social engineering attack by applying the...

  • Tales From CPU City™ (Episode 2) - Tailgating

    Tales From CPU City™ (Episode 2) - Tailgating

    In this episode, Private File uncovers an evil physical security plot that releases mayhem upon our beloved CPU City. Learn how the plot unfolds and what strategies can be used to combat the menacing physical threat we call tailgating. Topics: How...

  • Dial V for Vishing

    Dial V for Vishing

    In this episode, Private File uncovers an evil physical security plot that releases mayhem upon our beloved CPU City. Learn how the plot unfolds and what strategies can be used to combat the menacing physical threat we call tailgating. ...

  • SMiShed!

    SMiShed!

    Inspired by true events, SMiShed! recalls a recent SMS phishing (or SMiShing) attack that scammed several bank customers out of tens of thousands of dollars. By applying the best practices outlined in this Microlearning video, you can avoid being...

  • Living Mobile Secure

    Living Mobile Secure

    Attacks on mobile devices, mobile apps, and mobile carriers are rising fast. How can you ensure your device is secure? What happens if your phone or tablet is breached? Watch this video to learn more about what you can do to help protect yourself from...

  • Home Invasion: The Internet of Terrors?

    Home Invasion: The Internet of Terrors?

    It is projected that by 2025, there will be over 75 billion “things” connected to the Internet, otherwise known as the Internet of Things (IoT). Such massive connectivity will make life much more convenient for you, but potentially for...

  • Evil Twin

    Evil Twin

    An “Evil Twin” is a technique hackers use gain to access your information through phony Wi-Fi access points that appears to be legitimate. Evil Twins can be difficult to spot because they often have names very similar to authentic access...

  • Deepfakes

    Deepfakes

    What do you get when you mix publicly available media with technology such as machine learning? Well, cybercriminals are using this recipe to defraud victims, assist in their social engineering efforts, generate fake news, and spread false information...