Sample Agenda
- Myth Busters - Biggest Myths in Cyber Safety
- Common Threat Vectors – How to stay safe from;
- Downloads and attachments
- Malicious email and spam
- Social Engineering and Spear Phishing
- Unsolicited Phone call from scammers
- Social media
- USBs and external hard drives
- Passwords – Best practices
- System access – Company policy on sharing system access with others.
- Wireless networks – Safety Guidelines
- Physical Security - Best practices in and out of the office
- Identifying Sensitive Information – How should you treat this information
- Pre-breach action plan – What to do if you identify a possible threat
- Post-breach action plan – What to do if you are compromised
- Continuous Improvement – How to stay alert but not alarmed
Comments
0 comments
Please sign in to leave a comment.