Welcome to our world-class, interactive and free to use video portal.
An Introduction to Cyber Security
This short video introduces some general security concepts and to raise awareness about how to avoid online threats that might target you or our organisation. By identifying common online threats, understanding risk factors for each type of threat, and learning how to minimise the risk of an attack.
Creating Secure Passwords
A password is your account’s first line of defence, but it is also vulnerable to cyber attacks. This short video covers topics such as: Password strength and password diversity along with the best password security tools and practices for keeping your account secure.
What is Phishing?
A majority of cyber-intrusion attempts begin with phishing emails. These social engineering attacks are delivered via malicious links, file attachments, and login forms. This short video helps show the warning signs to look out for and what to do in the event of a phishing attack.
What is Ransomware?
Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. This short video introduces ransomware, discusses how it is delivered, and explains the effect of an infection. Users are provided with best practices for minimizing the threat of ransomware.
Safely Surfing The Web
The Internet is a minefield of cyber threats and potential traps. This short video teaches users how to avoid many of the common pitfalls and dangers associated with web browsing. They will learn how URLs are constructed, URL warning signs, and how to identify and avoid malicious links. Users will also learn how to recognise secure encrypted websites and other top tips to stay safe online.
What is a BEC Scam?
BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. Users will learn how to recognise these scams and learn basic best practices to protect against them.
Mobile Device Security
Criminals often target our mobile devices as a means for penetrating our accounts and information. This training module will teach users the importance of physical and technical safeguards for their mobile devices, as well as ways to improve the security of their mobile communications and connections.
Social Engineering Scams
Social engineering is the use of deception to manipulate individuals into divulging information that may be used for fraudulent purposes. This video explains the dangers associated with smishing, vishing, and in-person attacks. Users will learn how to recognise and avoid common social engineering techniques and keep themselves and their assets secure.
Cyber criminals use social media platforms to find their victims and the data needed to launch attacks. This short video will teach users how to protect themselves, their families, and their employers while using social networks.
The Insider Threat
Often an organisation’s biggest threat to their data and security is right under their nose. This interactive training module examines the potential for a company’s own employees, either intentionally or unintentionally, to inflict damage on the organisation. Users will learn how to recognise insider threats and learn basic best practices to protect against them.
Cyber Safety At Home
Cyber criminals don’t discriminate and will often target personal devices and accounts as easy targets. This short video will teach users how to secure family devices and networks as well as keep sensitive information secure at home.
Clean Desk Policy
Employees should be aware of best practices to prevent sensitive information from being viewed by unauthorised sources. This would include locking computers when unattended, keeping sensitive files in a locked cabinet when not in use, and being aware of your surroundings when working on sensitive data.
Securing the workplace and restricting physical access to devices and IT infrastructure is essential to securing data and online systems. This module will explain why physical security is important and how users can improve physical security in the workplace.