SOMETHING PHISHY IS GOING ON!



Similar documents
TRAINING SERVICES elearning

TRAINING SERVICES elearning

SANS Securing The Human

Development trend 3: Cultivating an Information Security Culture

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

2015 Information Security Awareness Catalogue

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

Is Cloud Accounting Right for Your Business? An Educational Report

Training and Awareness

Content Inventory. Security Awareness & Training PROGRAM PACKAGES E-LEARNING & GAMING VIDEOS & ANIMATIONS NEWSLETTERS & ARTWORK + ADDITIONS

Malware & Botnets. Botnets

Information Security It s Everyone s Responsibility

How to complete the Secure Internet Site Declaration (SISD) form

How to configure Mac OS X Server

National Cyber Security Month 2015: Daily Security Awareness Tips

Secure Authentication Managed Service Portfolio

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

White Paper. The Principles of Tokenless Two-Factor Authentication

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

PRIVACY + SECURITY TRAINING PROGRAM CATALOG

What Is BYOD? Challenges and Opportunities

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Access Tropical Cloud Desktop from Any Device

21/12/2015 CLOUD ADOPTION TRENDS. Agenda. Cloud Adoption. Cloud Deployment Model. Public Cloud Usage

Where every interaction matters.

Basic Security Considerations for and Web Browsing

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Are your people playing an effective role in your cyber resilience?

STOP. THINK. CONNECT. Online Safety Quiz

10 Quick Tips to Mobile Security

Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks

How to reduce the cost and complexity of two factor authentication

of firms with remote users say Web-borne attacks impacted company financials.

Prevent Security Breaches by Protecting Information Proactively

Certified Secure Computer User

Internet threats: steps to security for your small business

A Guide to MAM and Planning for BYOD Security in the Enterprise

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

FileCloud Security FAQ

Longmai Mobile PKI Solution

If you can't beat them - secure them

Use Bring-Your-Own-Device Programs Securely

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Egress Switch Best Practice Security Guide V4.x

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

IT Checklist. for Small Business INFORMATION TECHNOLOGY & MANAGEMENT INTRODUCTION CHECKLIST

Don't Be The Next Data Loss Story

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

CUSTOMER SECURITY AWARENESS: A Key Defense Against Corporate Account Takeover & Cyber Fraud

Security Overview Enterprise-Class Secure Mobile File Sharing

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

Introduction. PCI DSS Overview

Android (in)security. Having fun with Android. Sarantis Makoudis

Securing Corporate on Personal Mobile Devices

Beyond passwords: Protect the mobile enterprise with smarter security solutions

V ISA SECURITY ALERT 13 November 2015

ADDING STRONGER AUTHENTICATION for VPN Access Control

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

Future directions of the AusCERT Certificate Service

Securing Virtual Desktop Infrastructures with Strong Authentication

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

Cyber Security. Securing Your Mobile and Online Banking Transactions

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security

What Do You Mean My Cloud Data Isn t Secure?

Why you need. McAfee. Multi Acess PARTNER SERVICES

4 Steps to Effective Mobile Application Security

STOP Cybercriminals and. security attacks ControlNow TM Whitepaper

isheriff CLOUD SECURITY

Information Security. Annual Education Information Security Mission Health System, Inc.

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Why Is Compliance with PCI DSS Important?

Create Your Technology Strategy:

Secure Your Mobile Workplace

Guide to Evaluating Multi-Factor Authentication Solutions

Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

16 CLOUD APPS YOU NEED TO KNOW IF EMPLOYEES ARE USING

7 Simple Smartphone Privacy Tips:

10 Things Every Web Application Firewall Should Provide Share this ebook

CONTENTS. PCI DSS Compliance Guide

The Top Web Application Attacks: Are you vulnerable?

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_ Effective of 7 Title: Corporate Information Technology Usage Policy

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

USER ACTIVITY MONITORING FOR IBM SECURITY PRIVILEGED IDENTITY MANAGER

Practical tips for a. Safe Christmas

How Web Security Improves Productivity and Compliance

Finance & Ecommerce Systems

Modern two-factor authentication: Easy. Affordable. Secure.

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Transcription:

SOMETHING PHISHY IS GOING ON! Engaging, easy to understand, memorable training.

WHAT WE DO We have created a series of training episodes that are highly engaging, easy to understand and memorable. They cover security best practices and elements recommended by security frameworks and standards such as the ISO 27001 and PCI DSS (Payment Card Industry Data Security Standard). Awareness video content Marketing materials security awareness Getting the content to the user Client LMS Via SCORM 1.2 or 2004 3rd Edition exports compliance Cloud or or Mini LMS Via Popcorn Training s Cloud LMS secure coding installed onsite Plus SecureToon desktop Mailers Posters Screensavers Articles Comic strips Presentations Key messages are provided through the video content and reinforced by quiz questions and accompanying material such as comic strips and articles. User s understanding of the most important points is measured through a short quiz summary at the end of each module. STORY BASED TRAINING A picture is worth a thousand words, and we believe that a good story is worth a thousand training sessions. When listening to a story Biochemical changes take place in the brain Decrease levels of cortisol (the stress hormone) Promotes relaxation. By-pass critcial, analytical functions. Optimal mental state for accepting and retaining information. Listeners more receptive to change and new ideas

PRODUCTS INFORMATION SECURITY AWARENESS MODULES Currently available modules covering different aspects of information security: SOMETHING PHISHY! Something Phishy Intro: Phishing, Spear Phishing Dicey Devicey BYOD Security, awareness of info, PIN policy, remote wipe Mobile Mayhem Mobile threats, USB sticks, phones, laptops Freaky Leaky Data leakage threats, use of confidential information Pass the Password Social engineering, Password policy Cloud Security Threats, risks, safe use of cloud applications Breaking the Barrier Physical security, clean desk Social Media Value of data: threats Policy principles: Appropriate content, corporate values, 3rd party comments Phishious Malicious Internet usage, threats, drive by downloads Cybercons Setting up money mules/ bank account, online scams, social engineering

COMPLIANCE TRAINING MODULES Protection of Personal Information - Definition of personal information - Threats (identity theft) - Principles of POPI Act in relevance to end users Intro to Consumer Protection Act (CPA) - 9 principles of CPA explained - Applicability in retail environment The National Credit Act (NCA) - Overview of the National Credit Act - How to deal with consumers when discussing credit Treating Customers Fairly (TCF) - Introduction to Treating Customer Fairly (TCF) approach - Relevance of TCA in general product life cycle - 6 outcomes of TCA SECURE CODING TRAINING MODULES Web Application Security Intro Main threats to web applications - security principles Authentication & Authorisation Authentication, password controls, authorisation Avoiding Injection Attacks Preventing injection attacks Avoiding CSRF Attacks Secure transactions, secure deployment Secure Session Management Preventing session hijacking attacks Data security Cryptographic methods

SAFE ONLINE SITE and mobile app Company branded, practical Intranet site and/or mobile app (mobi) for staff on how to keep their families safe online. GETTING THE COURSES TO THE USER We can provide all our content in various formats to suit your needs: CLIENT LMS SCORM V.1.2 or 2004 compliant packages If you have an existing Learning Management System (LMS) onsite, we can provide courses in SCORM compliant packages for your integration. Packages include the videos as well as quiz questions. CLOUD The Popcorn Cloud Our training cloud solution allows for very easy access to course material from anywhere at any time. SECURETOON REQUIREMENTS: Windows server (can be virtual), Internet Information Services (IIS).Net framework 4, SQL or SQL Express Onsite Mini LMS We can provide our videos in a fun mini quiz application called SecureToon that can be installed on your network. SecureToon Desktop For users in remote or distributed offices, we can provide a simple windows application that can be distributed onto user s desktops. The application includes relevant video files, removing the need of streaming video content over the WAN.

MARKETING MATERIAL We offer a comprehensive kit of marketing materials to reinforce your campaign, and there s the option to customise material to suit your organisation s needs. Never share your login details with ANYONE (work or bank details) YOU ARE THE PHISH! Cyber-criminals want you to take the bait so they can steal your identity and your money. Posters Communicate key learning through comical posters Widespread awareness Repetition of key learning messages Full cast of memorable security awareness characters Don t click on suspicious links in emails you may download programs that steal your data! These phishies know how to avoid a phishing attack from Cybercriminals. Do you? To find out more, watch our cartoon Something Phishy and stand a chance to WIN an ipad mini. Go to [Intranet path] Articles/Newsletters Light-hearted & informative to ensure reader engagement Repetition of key learning messages Available for print or web media Monthly subscriptions available Comic strips Who doesn t love a comic? Grab a cup of coffee and giggle over the monthly security comic strip. Cartoon story based, humorous Available for print and web media Repetition of key learning messages Security made fun Email campaign teasers Cartoon story based Piques user curiosity Marketing tool to ensure interest and user participation in campaign Intranet banners, desktop-pop up messages or screensavers Launch day events Popcorn movie screening day Presentation material Character masks for industrial theater Marketing and event planning assistance - hiring of popcorn machine, red carpet, hand-outs

CONTACT US Telephone +27 21 813 9264 Email info@popcorntraining.com www.popcorntraining.com Visit us on facebook: Popcorn Training Fraudy Skimbag Robbin Yodata Find us on LinkedIn: Anna Collard Claire Stewart Sacha O Reilly