Do you know?
Do you know what to do when you receive a link or an attachment? Do you know how cybercriminals can use Artificial Intelligence (AI) to power cyberattacks and how users can take steps to prevent becoming a victim? Do you know the threats associated with scanning QR codes? Do you know how to tell if a link you receive in an email is secure?
Throughout the month of October, we will updating this page with mini training modules to strengthen and test your cybersecurity skills and promote cybersecurity best practices throughout the month.
Links and Attachments: Think Before You Click
We constantly receive notifications with links and attachments. Do you know what to do when you receive a link or attachment? This 10-minute module explains how cybercriminals use links and attachments to target you, what can happen if you click on them, and how you should handle any links or attachments you receive. You will receive tips on how to keep yourself safe from these types of attacks.
AI, Phishing, and Cybersafety
This 5-minute module, designed for use on a mobile device, gives a high-level overview of how cybercriminals can use artificial intelligence (AI) to power cyber attacks and how users can take steps to prevent becoming a victim. You will learn warning signs of AI-generated social engineering attacks and how to say secure while using AI programs.
An Overview of BEC and CEO Fraud
This 5-minute module, designed for use on a mobile device, provides an overview of how these attacks work and includes tips to ensure your organization and users are prepared to handle a BEC or CEO fraud attack. You will learn how BEC and CEO fraud attacks work and the steps to combat these attacks.
This 4-minute video module discusses the threats associated with scanning QR codes,along with security tips to help you users scan them safely. You will learn:
How cybercriminals can take over public QR codes for their own uses
Things to consider before engaging with any QR code
This 12-minute module will take users on a comprehensive learning journey about mobiledevice security. You will learn:
How social engineering can play out on mobile devices
Signs of a compromised mobile device
Steps to secure a mobile device
This 2-minute video describes what a user can look for to help them determine if a URL has been edited, providing best practices and tips they can follow to help keep their organization and themselves safe. You will learn:
How hackers can manipulate URLs
What warning signs to look for
This 3-minute module is designed for organizations that have implemented KnowBe4’s Phish Alert Button (PAB). It will explain how the PAB protects the organization from phishing attacks and why it is so important to make reporting suspicious emails a security habit. You will learn:
The basics of phishing tactics
How the PAB works
Why reporting phishing is important