Directive Blogs
Cybercriminals are exploiting text messages in sophisticated CEO fraud schemes, tricking employees into revealing sensitive information or sending money under the guise of urgent requests from top executives.
In this Micro Training, learn the essential strategies to protect yourself and your organization from these increasingly common and deceptive scams.
App stores are brimming with helpful tools and entertainment options, but hidden among these useful applications are malicious threats waiting to trip up unwary users.
In this Micro Training, learn more about the signs of suspicious apps so you can steer clear of the malicious ones and explore app stores with confidence.
Online marketplaces are not only havens for bargain hunting and re-selling – they are also a favorite hunting ground for cybercriminals looking to scam you out of goods, money, and personal information.
In this Micro Training, we’ll review common marketplace scams and the best ways to protect yourself from them.
If you’ve ever had the uneasy feeling like someone is reading over your shoulder or listening from around the corner, then you already have some experience with this scamming technique.
In this Micro Training, we’ll cover eavesdropping – what it is and what it means for the security of your desktop or laptop computer, as well as best practices for securing your system against it.
Did you know that the first element of an incoming message that we often see, especially on a mobile device, is not the sender’s email address but their display name.
In this Micro Training, tune in for another episode of the "Cyber Talk Show", and learn more about the sneaky tactic of display name spoofing.
Change is scary. Which is why, even though you know Password Managers help to manage complex passwords across several accounts, you still stick with the same, old passwords you’re comfortable with: using them over, and over, and over.
In this Micro Training, learn more about what Password Mangers have to offer, and see if this tool is a good match for your security goals.
Phishing has a fascinating historical and societal impact that is often overlooked. With Phishing401, this “senior level” course dives deeper into the subject matter, allowing you to advance in your phishing studies.
In this Micro Training, we will take a look at how phishing began, why it has been successful, and what causes psychology to play such an important role for both the scammer, and the victim.
An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.
In this micro training we’re looking at Intentional Insider Threats which are deliberate and often planned actions often carried out for personal gain or to right a perceived injustice.
An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.
In this micro training we’ll look at Unintentional Insider Threats, which are actions that may harm an organization that are NOT planned or carried out with malicious intent. The individual at fault is often referred to as a pawn.
An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.
In this micro training, we review six simple tips for staff, management and IT to safeguard their organization from potential insider threats.
Romance Scams are yet another area in which cybercriminals are leveraging our strongest emotions to cultivate an “error-prone mindset” leaving broken hearts and broken passwords in their wake.
In this Micro Training, we’ll look at some of the most common and recent iterations of the romance scam and how to cultivate the awareness it takes to beat them.
When you think of the Dark Web, you might picture a big spiderweb filled with illegal substances, counterfeit bills, and stolen credit cards. But did you know not everything on the Dark Web is nefarious?
So then what exactly is the Dark Web, and why is it associated with your personal information? Find out in this Micro Training.
When the afternoon slump hits, cybercriminals get to work pushing out their Spear Phishing campaigns. Why? Because people are more likely to make mistakes and click the link when they are burnt out.
In this Micro Training, learn the different signs and types of burnouts, and how they can affect your cybersecurity awareness.
Sooner or later we all find ourselves in a public place with a device in our hands and a Public WiFi network as our best means of connecting to the internet. However, Public WiFi can pose as a serious threat to our security and privacy.
This Micro Training focuses on simple steps we can all take to stay more secure and more aware when using Public WiFi connections.
Unsolicited text messages from unknown numbers have always been a go-to tactic for scammers. But when a message simply says, “Hi,” or “Sorry, wrong number,” curiosity may take over.
In this Micro Training, learn how scammers are carrying out wrong number scams and what to do if you receive one of these mysterious text messages.
Smart devices are quickly becoming an integral part of society. But as the world continues to get more connected, the number of connected devices susceptible to cybercriminals grows, as well.
In this Micro Training, find out how to keep your data safe despite the increasing number of smart devices connected to the Internet of Things.
Many users are aware that they are being tracked online. While some of this tracking can be used to customize the user experience, it is important to know how to protect your tracked data from cybercriminals’ prying eyes.
In this Micro Training, follow along as we dive into how internet tracking works and the many ways to protect your data.
Multi-Factor Authentication is a great way to restrict access to accounts if there were to be an exposure of your credentials, but cybercriminals are finding ways to get around these defenses.
In this Micro Training, learn the tricks cybercriminals are using to get past these security measures and the tips to make this process stronger.