Directive Blogs
While IT teams implement firewalls, antivirus protection, and system updates to strengthen your organization’s network, technology alone can’t stop every threat. That’s where the human firewall comes in.
In this week’s Micro Training, we’ll explore how security-aware employees play a vital role in identifying and preventing cybersecurity threats — and how every informed choice strengthens an organization’s defenses.
We’re kicking off Cybersecurity Awareness Month with real user stories about scams they’ve encountered. Staying safe online starts with awareness, and we’re stronger when we share our cybersecurity experiences with one another.
In this Micro Training, learn about phishing from real life stories and uncover tips and tricks that can help you avoid falling for scams.
Staying safe online means protecting your accounts with stronger authentication. That’s why this Cybersecurity Awareness Month, we’re diving into real stories about Multi-factor Authentication (MFA) and how cybercriminals try to bypass it.
In this Micro Training, learn how MFA works, where it can fall short, and what you can do to keep your accounts secure.
Your password is the first line of defense between you and a cybercriminal—but if it’s weak, reused, or predictable, it could prevent you from staying safe online.
In this Micro Training, we’re continuing Cybersecurity Awareness Month with tips on what makes a strong password, why password managers can help, and how cybercriminals exploit weak or reused passwords.
Cyber hygiene is a foundational first line of defense, and just like any other physical structure relies on a solid foundation, so does critical infrastructure.
In this Micro Training, we'll take a look at how the world’s most targeted and essential industries prioritize cyber hygiene, and what other industries can learn from their best practices.
Many of us have wearable devices that we use every day, but eventually these devices will have to be retired.
In this Micro Training, we’ll go over techniques like account delinking, cloud data purging, and more, making sure that you stay protected even after you part ways with your wearable device.
Did you know your wearable device could be silently connecting to Bluetooth devices and Wi-Fi networks you never approved of?
In this Micro Training, we’ll explore how hackers exploit these invisible connections, as well as how to lock down your wearable and keep your sensitive information out of the wrong hands.
Smartwatches, fitness trackers, and other wearables are more than health tools — they’re internet-connected devices that can expose personal and work data if not secured.
In this Micro Training, you’ll learn how wearables fit into the Internet of Things (IoT), the cybersecurity risks they pose, and what you can do to stay safe.
Your device might be working overtime, and not for you. Cryptojacking is when cybercriminals secretly use your system to mine cryptocurrency.
In this Micro Training, learn what cryptojacking is, why it’s dangerous, and how cybercriminals use your device to mine cryptocurrency without your knowledge.
Have you ever noticed your computer running more slowly, crashing randomly, and just behaving strangely? Fileless malware could be the culprit.
In this Micro Training, learn how fileless malware spreads, why it’s so difficult to detect, and the best ways to protect yourself from this invisible threat.
Scammers are constantly evolving their tactics, and telephone-oriented attack deliveries (TOADs) are a prime example. These attacks combine phone calls and emails to deceive users into revealing sensitive information or installing malware.
In this Micro Training, learn how TOAD attacks work, why they’re so effective, and how to stay protected.
Picture this: You’re heading out on vacation, but while you’re enjoying some well-deserved time off, cybercriminals are hard at work, setting the stage for their next phishing attack.
In this Micro Training, learn how scammers can exploit your Out-of-Office auto-reply emails, and what you can do to stay protected.
Imagine getting a call from a friend in trouble, begging you to help by sending money via a gift card. It seems urgent, but take a moment to pause and think, as you may be the target of a gift card scam.
In this Micro Training, learn how to recognize red flags that could indicate gift card scams, and how to protect yourself.
Imagine getting an email that threatens to reveal your most personal secrets—only to realize it's all a carefully crafted lie meant to scare you.
In this Micro Training, we uncover how sextortion scams use fear and publicly available information to create fake threats. We also explain what to do if you’re the target of this type of sextortion scam.
What would you do if someone you trusted turned your intimate photos into a weapon of blackmail? This alarming reality, known as sextortion, is a growing threat that could happen to anyone.
In this Micro Training, learn how to protect yourself from sextortion scams, recognize red flags, safeguard your online presence, and take immediate action if targeted.
In today's digital world, passwords alone aren't enough to protect your accounts from cyber threats. That's why multi-factor authentication (MFA) is becoming a crucial tool in cybersecurity.
In this Micro Training, learn how implementing MFA can enhance your security and discover how cybercriminals are trying to capitalize on this growing security trend.
Cybercriminals are exploiting text messages in sophisticated CEO fraud schemes, tricking employees into revealing sensitive information or sending money under the guise of urgent requests from top executives.
In this Micro Training, learn the essential strategies to protect yourself and your organization from these increasingly common and deceptive scams.
App stores are brimming with helpful tools and entertainment options, but hidden among these useful applications are malicious threats waiting to trip up unwary users.
In this Micro Training, learn more about the signs of suspicious apps so you can steer clear of the malicious ones and explore app stores with confidence.
Online marketplaces are not only havens for bargain hunting and re-selling – they are also a favorite hunting ground for cybercriminals looking to scam you out of goods, money, and personal information.
In this Micro Training, we’ll review common marketplace scams and the best ways to protect yourself from them.
If you’ve ever had the uneasy feeling like someone is reading over your shoulder or listening from around the corner, then you already have some experience with this scamming technique.
In this Micro Training, we’ll cover eavesdropping – what it is and what it means for the security of your desktop or laptop computer, as well as best practices for securing your system against it.
Did you know that the first element of an incoming message that we often see, especially on a mobile device, is not the sender’s email address but their display name.
In this Micro Training, tune in for another episode of the "Cyber Talk Show", and learn more about the sneaky tactic of display name spoofing.
Change is scary. Which is why, even though you know Password Managers help to manage complex passwords across several accounts, you still stick with the same, old passwords you’re comfortable with: using them over, and over, and over.
In this Micro Training, learn more about what Password Mangers have to offer, and see if this tool is a good match for your security goals.
Phishing has a fascinating historical and societal impact that is often overlooked. With Phishing401, this “senior level” course dives deeper into the subject matter, allowing you to advance in your phishing studies.
In this Micro Training, we will take a look at how phishing began, why it has been successful, and what causes psychology to play such an important role for both the scammer, and the victim.
An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.
In this micro training we’re looking at Intentional Insider Threats which are deliberate and often planned actions often carried out for personal gain or to right a perceived injustice.
An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.
In this micro training we’ll look at Unintentional Insider Threats, which are actions that may harm an organization that are NOT planned or carried out with malicious intent. The individual at fault is often referred to as a pawn.
An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.
In this micro training, we review six simple tips for staff, management and IT to safeguard their organization from potential insider threats.
Romance Scams are yet another area in which cybercriminals are leveraging our strongest emotions to cultivate an “error-prone mindset” leaving broken hearts and broken passwords in their wake.
In this Micro Training, we’ll look at some of the most common and recent iterations of the romance scam and how to cultivate the awareness it takes to beat them.
When you think of the Dark Web, you might picture a big spiderweb filled with illegal substances, counterfeit bills, and stolen credit cards. But did you know not everything on the Dark Web is nefarious?
So then what exactly is the Dark Web, and why is it associated with your personal information? Find out in this Micro Training.
When the afternoon slump hits, cybercriminals get to work pushing out their Spear Phishing campaigns. Why? Because people are more likely to make mistakes and click the link when they are burnt out.
In this Micro Training, learn the different signs and types of burnouts, and how they can affect your cybersecurity awareness.
Sooner or later we all find ourselves in a public place with a device in our hands and a Public WiFi network as our best means of connecting to the internet. However, Public WiFi can pose as a serious threat to our security and privacy.
This Micro Training focuses on simple steps we can all take to stay more secure and more aware when using Public WiFi connections.
Unsolicited text messages from unknown numbers have always been a go-to tactic for scammers. But when a message simply says, “Hi,” or “Sorry, wrong number,” curiosity may take over.
In this Micro Training, learn how scammers are carrying out wrong number scams and what to do if you receive one of these mysterious text messages.
Smart devices are quickly becoming an integral part of society. But as the world continues to get more connected, the number of connected devices susceptible to cybercriminals grows, as well.
In this Micro Training, find out how to keep your data safe despite the increasing number of smart devices connected to the Internet of Things.
Many users are aware that they are being tracked online. While some of this tracking can be used to customize the user experience, it is important to know how to protect your tracked data from cybercriminals’ prying eyes.
In this Micro Training, follow along as we dive into how internet tracking works and the many ways to protect your data.
Multi-Factor Authentication is a great way to restrict access to accounts if there were to be an exposure of your credentials, but cybercriminals are finding ways to get around these defenses.
In this Micro Training, learn the tricks cybercriminals are using to get past these security measures and the tips to make this process stronger.
