Learn more
Awareness
Military/Defense
Free Online Courses
Articles and links
These free security awareness videos were developed in partnership with Adobe, the National Cyber Security Alliance, and Speechless, Inc.
The first video of the video series is on passwords. The key points mentioned, if implemented throughout the organization can dramatically reduce risk of compromise. There are key takeaways stated at the end of the video.
Learn more about how to protect your data and identity. The use of data helps make our lives more convenient and streamlined which likely means the proliferation of online data and devices are here to stay. There is one best practice that each of us can apply that will help personal data stay more secure – only share on a need-to-know basis.
Having something stolen from you tends to leave an indelible feeling of violation and injustice. If what is stolen is an electronic device (e.g. laptop, phone, flashdrive), not only is the property gone but so is your data. Stolen data can be a more damaging long term than the loss of the physical device itself. The data could be personal or company data. If device is able to be used by the thief, there are many ways the device can become of value.
Phishing, we’ve heard of it, but what does it mean? In summary, it is a tool and method attackers use to try and coerce people into clicking on a malicious site or download, potentially leading to a security issue.
When it comes to cyber security best practices, removable media and devices must only be plugged or inserted into your computer if you trust/know the source.
The latest security awareness video covers “vishing” which is defined as the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to trick individuals to reveal personal information, such as bank details and credit card numbers.
The security threat of malicious downloads has widened in scope since my high school days. As internet users, we can download to our phones, laptops, desktops, tablets, etc. We can also download from emails, websites, instant messaging, text messages, etc. All it takes is a click or tap and, in some cases, we won’t even notice an application or file was downloaded and installed.
Come on – let’s admit it. We’ve all been in that desperate situation where we need Wi-Fi access but the only Wi-Fi around is “unsecured”. In other words, there is no lock symbol next to the familiar Wi-Fi symbol. It’s FREE, or so we think – as some economists put it…”there is no such thing as a free lunch”.
Tekimax Studio™ has all the features you need to collaborate effectively, hit deadlines, and deliver a high quality product for your clients.