Cybersecurity Tonight CyberEscape Online Collection
Cybersecurity Tonight
Audience: General End User (All)
Difficulty Level: Foundational
Time: Various options below, 60 Minute Version recommended
Availability: CyberEscape Online
- Cybersecurity Tonight (6 Puzzles) - 60 Minute Version, 6 Puzzles + 6 Summary Questions
- Cybersecurity Tonight (6 Puzzles) - 85 Minute Version - Same content as 60 Minute Version but allows 15 minutes additional time for play and discussion for total 85 minutes, 6 Puzzles + 6 Summary Questions. This version is available upon request only.
- Cybersecurity Tonight (1 Puzzle) - 15 Minute Version
Availability: Training Platform as Independent Modules
- Cybersecurity Tonight Retention Quiz - 10 question assessment
- CyberEscape Online - Cybersecurity Tonight Attendance - 1 question assessment
- CyberEscape Online - Cybersecurity Tonight Registration - registration link with confirmation that individual has registered. This module must be customized with your unique CyberEscape Online registration links.
Interested in assigning this Cybersecurity Tonight on the Training platform? Check out the Cybersecurity Tonight Collection for Training HERE!
Trailer:
Marketing Materials: Cybersecurity Tonight Marketing Kit
Media Alternative: Cybersecurity Tonight: Hosted and Moderator-free Guide
The Storyline: Welcome to Late Night Tonight with Andre Oliver, LSTV’s hit late night talk show! We’ve got a great show for you tonight, jam-packed with guests ready to share their cybersecurity expertise.
Major Themes: Cybersecurity Tonight covers 7 unique cybersecurity concepts all in one place, making it a great fit for your annual training needs. Concepts can also be assigned individually as separate modules and include cybersecurity as a responsibility, physical security, social engineering, phishing, passwords and authentication, mobile device security and device updates, and malware with an emphasis on ransomware.
Major Learning Concepts:
- Cybersecurity is Part of Your Job
- Personal responsibility
- Effectiveness of strong cybersecurity culture
- Reporting suspicious activity
- Policy compliance
- Passwords & Authentication
- Passphrases
- Risks of password reuse
- Password managers
- Multi-factor authentication
- Malware/Ransomware
- How malware spreads
- Staying safe
- Ransomware definition
- Backups
- Phishing
- Smishing, vishing, and social media phishing
- Red flags
- Staying safe
- Malicious links and attachments
- Reporting suspicious activity
- Mobile Device Security & Device Updates
- Device updates
- Password-protecting devices
- Reporting lost or stolen devices
- Dangers of public Wi-Fi
- Physical Security
- Locking unattended devices
- Tailgating
- Dangers of removable devices
- Social Engineering
- Social engineering definition
- Objectives of social engineering
- White hat hackers
- Social engineering in physical breeches
- Staying safe
Integrated Puzzles:
- Rings of Privacy* Puzzle
- Rank personal data from most to least private
- Not included in 1 Puzzle version
- Password Management Mastery Puzzle
- Complete the sentences on good password management practices
- Included in all versions
- Panicking Pal: Ransomware* Puzzle
- Choose the best advice for a friend that has fallen victim to a ransomware scheme
- Not included in 1 Puzzle version
- Phishing from a Cybercriminal's Perspective* Puzzle
- Take on the role of a cybercriminal and craft the strongest phish
- Not included in 1 Puzzle version
- Most Secure Mobile Device Puzzle
- Determine who is the most secure individual out of a lineup by asking them questions about their cyber hygiene
- Not included in 1 Puzzle version
- Secure the Office! Puzzle
- Search around a office space to flag security issues
- Not included in 1 Puzzle version
* Puzzles also available as Puzzle Modules in the Training Platform (for Training clients).