Quick view Before You Post Meet Bob. He’s ready to take some much-needed vacation time. Before he starts his week-long adventure, he leaves a quick post on Facebook. Unfortunately, when Bob returns home, he finds that things are not quite the same. Watch this video to find... View Details
Quick view Password Strong Passwords are the keys to our digital lives and allow us access to our many personal and work accounts. But how easy would it be for a hacker to crack your password? This video covers tips for creating strong passwords, and how you can protect yourself... View Details
Quick view Protecting Against Spear Phishers Spear phishing attacks target individuals with highly tailored emails that appears to be coming from a co-work or someone they know and trust, making it difficult to avoid opening attachments, clicking on infected links, or replying to attackers with... View Details
Quick view Home Cybersecurity Securing your home Internet experience can be like steering a ship through stormy seas. Inspired eLearning can help you navigate the perils of securing your home network. The trick is to make sure that you Isolate, Update and Defend. Watch this video to... View Details
Quick view The Fake App Trap Many of your favorite retailers and service providers have developed mobile apps so you can conveniently purchase goods and services, directly from your mobile device. But did you know that cybercriminals are also hard at work cooking up fake apps, using... View Details
Quick view The Business Email Compromise Business Email Compromise, or BEC, can take a variety of forms. In most cases, the scammers use phishing tactics to target employees with access to company finances and trick them into paying invoices or making payments to bank accounts thought to belong... View Details
Quick view S-A-F-E Web Browsing Upon completion of this module, you will be able to recognize scams used by cybercriminals that exploit consumers browsing the web, apply the S-A-F-E model to help protect against threats associated with browsing the web, and use the best practices... View Details
Quick view Social Media Social media can be an excellent tool to connect and interact with customers, show thought leadership, and build a brand, but it also poses unique security, HR, and public relations challenges. This course covers social media best practices including... View Details
Quick view Password Management Passwords are the keys to our digital lives and protect us from hackers and cybercriminals, but how exactly could a hacker crack your password and what can you do to protect it? This HTML5-based, iPad-compatible password management course uses... View Details
Quick view The Malware Threat Malware is any type of software that is intended to damage or disable computer systems. It is often used to steal information, destroy or lock users from data, or disrupt operations. This course defines malware and the associated security threats, and... View Details
Quick view An Introduction to Insider Threats Across the globe, organizations spend countless hours working to keep sensitive data out of the hands of cybercriminals. This task has become even more difficult to manage due to an increasing number of data compromises that stem from insider threats... View Details