banner img

Cyber Etiquette: Journey to Safety

10 minutes Short course All industries

This course focuses on proper behaviour in email communication and social media.

Description

Human error remains the most likely cause of cyber breaches, with phishing emails the no. 1 tactic used by attackers. In more sophisticated attacks, such as spear phishing attacks, emails will target individuals or organisations, being more personalised to include the victim or company's name. Such attacks can have a devastating impact, often resulting in sensitive information being compromised and financial repercussions. Through an interactive experience, learners will uncover a range of subjects including how scammers exploit oversharing on LinkedIn and how to set up secure accounts on popular services.

Features

  • How to keep you and your business safe online
  • What data scammers use to creating phishing and other attacks
  • Real-world impacts of cyber security breaches

SIGN UP FOR FREE-TRIAL

This is a trial version of the VinciWorks course Anti-Bribery Fundamentals. This course can be fully adapted to suit your industry and location. Custom content can be easily added.

By filling in this form you will receive periodic emails with other resources and offers related to this one. We take privacy seriously, click here to read our privacy policy.

Similar Courses

DORA: The Digital Operational Resilience Act

30 minutes Full course Financial Services

Cyber Security: Practical Applications

20 minutes Full course All industries

Protecting Your Identity

5 minutes Take 5 All industries

Password Safety: A Guide for Faculty and Staff

5 minutes Take 5 Education

Ransomware

5 minutes Take 5 All industries

Cyber Knowledge Check

5 minutes Knowledge check All industries

Cyber Security: Practical Applications for Students

20 minutes Full course Education

Phishing Challenge

5 minutes Take 5 All industries

Phishing Challenge 2.0

5 minutes Take 5 All industries

Password Safety (Law)

5 minutes Take 5 Law

NIS2: The EU's Cyber Security Directive

30 minutes Full course All industries

Cyber Security Adaptive

30 minutes Full course All industries

Phishing Challenge 3.0

5 minutes Take 5 All industries

Cybersicherheit: Praktische Anwendungen

20 minutes Full course All industries

Cyber Security: A Student's Guide to Online Safety

30 minutes Full course Education

Social Media: Communicating at Work

45 minutes Full course All industries

Setting a Secure Password

5 minutes Take 5 All industries

Ransomware: Die nächste digitale Geiselkrise verhindern

5 minutes Take 5 All industries

Social Engineering Verstehen

5 minutes Take 5 All industries

Social Media Knowledge Check

5 minutes Knowledge check All industries

Social Media: Communicating Safely (Higher Education)

20 minutes Full course Education

Recognising Phishing Scams (Higher Education)

5 minutes Take 5 Education

Cyber Security: Passwords Knowledge Check

5 minutes Knowledge check All industries

Cyber Security: Social Engineering Knowledge Check

5 minutes Knowledge check All industries

Cyber Etiquette: Journey to Safety

10 minutes Short course All industries

Cyber Risk: Journey to Safety

20 minutes Full course All industries

Cyber Security: The Basics Knowledge Check

5 minutes Knowledge check All industries

Schutz vor Phishing-Angriffen

5 minutes Take 5 All industries

Ein sicheres Passwort festlegen

5 minutes Take 5 All industries

Soziale Medien: Best Practices am Arbeitsplatz

20 minutes Full course All industries

Cyber Security: Journey to Safety

30 minutes Full course All industries

Cyber Security: Phishing Knowledge Check

5 minutes Knowledge check All industries

Identitätsschutz

5 minutes Take 5 All industries

Recognising Phishing Scams (Law)

10 minutes Short course Law

Phishing Challenge 4.0

5 minutes Take 5 All industries

Email@Risk

15 minutes Full course All industries

Cyber Security: Journey to Safety (Hong Kong)

1 hour Full course Law

Cybersicherheit: Schutz in der digitalen Welt

30 minutes Full course All industries

Consequences of Cybercrime

5 minutes Take 5 All industries

Cyber Security: A Guide to Online Safety (Law)

30 minutes Full course Law

Phishing Awareness

5 minutes Take 5 All industries

Understanding Social Engineering

5 minutes Take 5 All industries

Email@Risk (Law)

15 minutes Full course Law

Reviews

Spending time looking for parcel around the neighbourhood is a thing of the past. That’s a promise.

Spending time looking for parcel around the neighbourhood is a thing of the past. That’s a promise.

Spending time looking for parcel around the neighbourhood is a thing of the past. That’s a promise.

Spending time looking for parcel around the neighbourhood is a thing of the past. That’s a promise.

Spending time looking for parcel around the neighbourhood is a thing of the past. That’s a promise.