top of page

VIDEOS

Welcome to our world-class, interactive and free to use video portal.

Public Portal thumbnails-04.png

Subscribe to our channel

Content Thumbnail_An Intro To Cyber Security Video.png

An Introduction to Cyber Security

This short video introduces some general security concepts and to raise awareness about how to avoid online threats that might target you or our organisation. By identifying common online threats, understanding risk factors for each type of threat, and learning how to minimise the risk of an attack.

Content Thumbnail_Creating Secure Passwords Video.png

Creating Secure Passwords

A password is your account’s first line of defence, but it is also vulnerable to cyber attacks. This short video covers topics such as: Password strength and password diversity along with the best password security tools and practices for keeping your account secure.

Content Thumbnail_What Is Phishing Video.png

What is Phishing?

A majority of cyber-intrusion attempts begin with phishing emails. These social engineering attacks are delivered via malicious links, file attachments, and login forms. This short video helps show the warning signs to look out for and what to do in the event of a phishing attack.

Content Thumbnail_Ransomware Video.png

What is Ransomware?

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. This short video introduces ransomware, discusses how it is delivered, and explains the effect of an infection. Users are provided with best practices for minimizing the threat of ransomware.

Content Thumbnail_Surfing The Web Video.png

Safely Surfing The Web

The Internet is a minefield of cyber threats and potential traps. This short video teaches users how to avoid many of the common pitfalls and dangers associated with web browsing. They will learn how URLs are constructed, URL warning signs, and how to identify and avoid malicious links. Users will also learn how to recognise secure encrypted websites and other top tips to stay safe online.

Content Thumbnail_BEC Scam Module Video.png

What is a BEC Scam?

BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. Users will learn how to recognise these scams and learn basic best practices to protect against them.

Content Thumbnail_Mobile Device Security Video.png

Mobile Device Security

Criminals often target our mobile devices as a means for penetrating our accounts and information. This training module will teach users the importance of physical and technical safeguards for their mobile devices, as well as ways to improve the security of their mobile communications and connections.

Content Thumbnail_Social Engineering Video.png

Social Engineering Scams

Social engineering is the use of deception to manipulate individuals into divulging information that may be used for fraudulent purposes. This video explains the dangers associated with smishing, vishing, and in-person attacks. Users will learn how to recognise and avoid common social engineering techniques and keep themselves and their assets secure.

Content Thumbnail_Social Media Video.png

Social Media

Cyber criminals use social media platforms to find their victims and the data needed to launch attacks. This short video will teach users how to protect themselves, their families, and their employers while using social networks.

Content Thumbnail_The Insider Threat Video.png

The Insider Threat

Often an organisation’s biggest threat to their data and security is right under their nose. This interactive training module examines the potential for a company’s own employees, either intentionally or unintentionally, to inflict damage on the organisation. Users will learn how to recognise insider threats and learn basic best practices to protect against them.

Content Thumbnail_Cyber Safety At Home Vdeo.png

Cyber Safety At Home

Cyber criminals don’t discriminate and will often target personal devices and accounts as easy targets. This short video will teach users how to secure family devices and networks as well as keep sensitive information secure at home.

Content Thumbnail_Clean Desk Policy Video.png

Clean Desk Policy

Employees should be aware of best practices to prevent sensitive information from being viewed by unauthorised sources. This would include locking computers when unattended, keeping sensitive files in a locked cabinet when not in use, and being aware of your surroundings when working on sensitive data.

Content Thumbnail_Identity Theft Video (1).png

Identity Theft 

Ever wonder what life might be like if you had a clone? Because when you’re a victim of Identity Theft, that’s what happens. In this video we explain what Identity Theft is and how you can prevent it from happening to you.

Content Thumbnail_Protecting Business Information (1).png

Protecting Business Information

You’re probably already doing the basics like not leaving confidential documents lying around, and never writing passwords on post-it notes. Business data is super valuable and in this video we explain how you could protect it.

bottom of page