• Introduction to Workplace Cybersecurity

    • Welcome to Workplace Cybersecurity

      Cybersecurity is no longer just an IT concern; it’s everyone’s responsibility. As technology becomes increasingly integrated into our work, the risks of cyberattacks grow. In this chapter, we’ll explore why cybersecurity matters and what role you play in keeping our workplace secure.

      What is Cybersecurity?

      Cybersecurity refers to the measures taken to protect computers, networks, and data from unauthorized access or damage. It involves a combination of technology, processes, and people working together to safeguard sensitive information.

      Why is Cybersecurity Important?

      A single data breach can result in stolen customer information, financial loss, and damage to our company’s reputation. Beyond organizational risks, breaches can affect you personally, such as identity theft or fraud.

      Your Role in Cybersecurity

      Every employee is a gatekeeper. By following best practices and staying alert, you can help prevent incidents. In this course, you’ll learn how to recognize risks and adopt habits to protect both the company and yourself.

      manual completion mode

  • Identifying and Avoiding Cyber Threats

    • Understanding Cyber Threats

      Cyber threats come in many forms, from phishing emails to malware hidden in downloads. Recognizing these threats is the first step in defending against them.

      • Phishing: Cybercriminals pose as legitimate entities to trick you into providing sensitive information. Look for red flags like unusual email addresses, poor grammar, and urgent requests.
      • Malware and Ransomware: Harmful software that can lock your files or steal data. Often, these come through downloads or compromised websites.
      • Social Engineering: Manipulative tactics where attackers exploit human behavior to gain access to secure systems.
       
      Practical Tips to Avoid Threats
      • Never click on links or download attachments from unknown sources.
      • Double-check email addresses, especially for requests involving money or sensitive data.
      • When in doubt, verify requests with a colleague or manager before taking action.

      automatic completion mode

    • Interactive Activity: Phishing Exercise

      Try to identify phishing emails in a set of examples provided. Can you spot the scams? 

      automatic completion mode

    • Subject: Urgent: Account Deactivation Notice

      Body:
      Dear User,

      Your account will be permanently deactivated within 24 hours due to unusual activity. To keep your account active, please verify your login details immediately by clicking the link below:

      Verify My Account Now

      Failure to act will result in loss of access to your data.

      Thank you,
      Support Team

    • automatic completion mode

    • Is this a phishing email?
    • automatic completion mode

    • Subject: Team Meeting Scheduled for Friday

      Body:
      Hi [Employee Name],

      We’ve scheduled a team meeting to discuss project updates this Friday at 10:00 AM in the conference room. Please bring your latest progress report and be prepared to share updates.

      If you have scheduling conflicts, let me know as soon as possible.

      Best regards,
      [Manager Name]

      automatic completion mode

    • Is this a phishing email?
    • automatic completion mode

  • Data Protection Best Practices

    • Why Protecting Data Matters

      Our organization handles sensitive data daily, from client information to internal strategies. Protecting this data isn’t just about compliance; it’s about trust.

      Creating Strong Passwords

      Passwords are your first line of defense. A strong password is long, unique, and includes a mix of letters, numbers, and symbols. Avoid using personal details like birthdays or names.

      Using Multifactor Authentication (MFA)

      MFA adds an extra layer of security by requiring more than just a password. Even if your password is compromised, MFA keeps your account secure.

      Safe File Sharing

      Always use approved tools for sharing files, and ensure they are encrypted when possible. Never share sensitive data via unsecured channels like personal email or messaging apps.

      Interactive Activity: Password Test

      Test a password using a security tool. If it’s weak, practice creating a stronger alternative.

      manual completion mode