Security First Preferred Solution

  • Before You Post

    Before You Post

    Meet Bob. He’s ready to take some much-needed vacation time. Before he starts his week-long adventure, he leaves a quick post on Facebook. Unfortunately, when Bob returns home, he finds that things are not quite the same. Watch this video to find...

  • Password Strong

    Password Strong

    Passwords are the keys to our digital lives and allow us access to our many personal and work accounts. But how easy would it be for a hacker to crack your password? This video covers tips for creating strong passwords, and how you can protect yourself...

  • Protecting Against Spear Phishers

    Protecting Against Spear Phishers

    Spear phishing attacks target individuals with highly tailored emails that appears to be coming from a co-work or someone they know and trust, making it difficult to avoid opening attachments, clicking on infected links, or replying to attackers with...

  • Home Cybersecurity

    Home Cybersecurity

    Securing your home Internet experience can be like steering a ship through stormy seas. Inspired eLearning can help you navigate the perils of securing your home network. The trick is to make sure that you Isolate, Update and Defend. Watch this video to...

  • The Fake App Trap

    The Fake App Trap

    Many of your favorite retailers and service providers have developed mobile apps so you can conveniently purchase goods and services, directly from your mobile device. But did you know that cybercriminals are also hard at work cooking up fake apps, using...

  • The Business Email Compromise

    The Business Email Compromise

    Business Email Compromise, or BEC, can take a variety of forms. In most cases, the scammers use phishing tactics to target employees with access to company finances and trick them into paying invoices or making payments to bank accounts thought to belong...

  • S-A-F-E Web Browsing

    S-A-F-E Web Browsing

    Upon completion of this module, you will be able to recognize scams used by cybercriminals that exploit consumers browsing the web, apply the S-A-F-E model to help protect against threats associated with browsing the web, and use the best practices...

  • Social Media  

    Social Media  

    Social media can be an excellent tool to connect and interact with customers, show thought leadership, and build a brand, but it also poses unique security, HR, and public relations challenges. This course covers social media best practices including...

  • Password Management

    Password Management

    Passwords are the keys to our digital lives and protect us from hackers and cybercriminals, but how exactly could a hacker crack your password and what can you do to protect it? This HTML5-based, iPad-compatible password management course uses...

  • The Malware Threat

    The Malware Threat

    Malware is any type of software that is intended to damage or disable computer systems. It is often used to steal information, destroy or lock users from data, or disrupt operations. This course defines malware and the associated security threats, and...

  • An Introduction to Insider Threats

    An Introduction to Insider Threats

    Across the globe, organizations spend countless hours working to keep sensitive data out of the hands of cybercriminals. This task has become even more difficult to manage due to an increasing number of data compromises that stem from insider threats...