Skip to content
English
  • There are no suggestions because the search field is empty.

Security Made Simple Collection

Security Made Simple

SecurityMadeSimple_Overview_8-5x11

Audience: General End User (All)
Difficulty Level: Foundational
Time: 26 modules, ≈1-2 minutes each
Availability: Available on Training as Independent Modules. Do not need to be assigned or watched together, designed to stand independently.

Modules:

  • Alternative Forms of Phishing (1:15 Video)
  • Cybersecurity for the Family (1:07 Video)
  • Data Classification (1:29 Video)
  • Email Compromise (1:13 Video)
  • Insider Threat Behavior (1:08 Video)
  • Least Privilege (0:57 Video)
  • Malware (1:27 Video)
  • MFA Fatigue (1:05 Video)
  • Multifactor Authentication (MFA) (1:01 Video)
  • Oversharing on Social Media (1:01 Video)
  • Password Best Practices (1:15 Video)
  • Password Managers (0:59 Video)
  • Phishing (1:01 Video)
  • Ransomware (1:16 Video)
  • Removable Media (0:53 Video)
  • Reusing Passwords (1:08 Video)
  • Security Culture for People Managers (1:13 Video)
  • Social Engineering (1:12 Video)
  • Targeted Phishing (0:56 Video)
  • Travel Security (1:04 Video)
  • Unapproved Software (1:05 Video)
  • Updates (1:03 Video)
  • Virtual Private Networks (0:59 Video)
  • Why Security Matters (1:16 Video)
  • WiFi Security (1:17 Video)
  • Working from Home (1:10 Video)

Trailer


Marketing Materials: Security Made Simple Marketing Kit



Major Themes: These quick, digestible awareness modules will introduce your end users to the basics of key cybersecurity concepts.

Major Learning Concepts:
  • Alternative Forms of Phishing
    • Types of phishing besides email phishing (smishing, vishing, angler phishing, search engine phishing, pop-up phishing)
    • Staying safe from alternative forms of phishing
    • Reporting suspicious messages to the security team
  • Cybersecurity for the Family
    • Importance of teaching children cybersecurity best practices
    • Parental control apps and monitoring childrens’ online activity
    • Basic best practices children should know
  • Data Classification
    • Sorting data into public and private categories
    • Importance of classifying data
    • Double-checking sharing settings of private data stored in the cloud
  • Email Compromise
    • Use of a compromised business or vendor email to launch phishing attacks
    • Red flags to look out for
    • Reporting suspicious messages
  • Insider Threat Behavior
    • Definition of accidental and malicious insider threats
    • Many insider threats occur because working too fast or taking shortcuts cause people to neglect security policies
    • Early warning signs of insider threats that can be report to prevent data breaches
  • Least Privilege
    • Definition of principle of least privilege
    • Limiting and revoking access
    • Benefits to following the principle of least privilege
  • Malware
    • How devices become infected with malware
    • What cybercriminals use malware for
    • How updating software and devices helps prevent malware infections
  • MFA Fatigue
    • Definition of MFA fatigue attacks
    • Social engineering used in conjunction with MFA fatigue attacks
    • Reporting suspicious login attempts to the security team
  • Multifactor Authentication (MFA)
    • Definition of multi-factor authentication
    • Examples of secondary authentication
    • Buying and selling of compromised passwords on the dark web
  • Oversharing on Social Media
    • Use of information found on social media for synthetic identity theft
    • Examples of information that are risky to post on social media
    • Use of personal information to phish friends and family of the user
  • Password Best Practices
    • Using long passwords with numbers and letters to thwart password cracking software
    • Online tools that can demonstrate difference of effectiveness between short and long passwords
    • Importance of having a unique password for every account
  • Password Managers
    • Importance of using unique passwords on each account
    • Benefits of using a password manager
    • Risks of writing down passwords
  • Phishing
    • Definition of phishing
    • Red flags to look for in messages
    • Reporting suspicious messages to the security team
  • Ransomware
    • Growing prevalence of ransomware
    • How ransomware infections occur
    • Backing up data so it can be restored during a ransomware attack
  • Removable Media
    • Removable media shipped from the seller preloaded with malware
    • Risks of removable media found in random places like a parking lot
    • Importance of following policies surrounding removable media
  • Reusing Passwords
    • Buying and selling of compromised passwords on the dark web
    • Importance of using a unique password for every account
    • Using password managers to store passwords
  • Security Culture for People Managers
    • Working as a team to protect data
    • Examples of integrating data privacy into small, everyday actions
    • Leading by example
  • Social Engineering
    • What social engineering is used for
    • Staying safe from social engineering
    • What to do if a social engineer tricks you
  • Targeted Phishing
    • Definitions of spearphishing and whaling
    • Tactics used in targeted phishing attacks
    • Avoiding unexpected links and attachments
  • Travel Security
    • Connecting to a personal hotspot instead of public wifi
    • Avoiding public USB ports
    • Keeping devices in sight at all times
  • Unapproved Software
    • Definition of shadow IT
    • Risks of downloading software that hasn’t been preapproved by IT
    • Spreading of malware from an infected device to others on the network
  • Updates
    • How updating devices and software reduces vulnerabilities
    • Why updates need to be installed timely
    • Risks of leaving device and software updates uninstalled
  • Virtual Private Networks
    • Use of public wifi to spy on user’s online activity
    • How VPNs work
    • Benefits of using a VPN
  • Why Security Matters
    • Risk involved handling sensitive data and using internet-connected devices
    • Consequences of security incidents in personal life and at work
    • Message of appreciation for helping keep the user’s organization safe
  • WiFi Security
    • Risks of connecting to public wifi
    • Alternative options for connecting to the internet on-the-go
    • Importance of keeping a strong password on home wifi
  • Working From Home
    • Securing home wifi with a strong, unique password
    • Why work shouldn’t be done on personal devices
    • Following organizational removable media policies

🔍 View Security Made Simple in your Living Security platform catalog here!