Objective: To securely download programs Key points : – Risks of downloading applications – Use trusted or official sites – Use of application store authorised by the organisation – Consulting your IT department to install software Duration: 2 minutes Format: Video micro-learning
Themes Phishing has been used for many years by hackers. However, this phishing technique has been perfected over time, both in terms of the form of these false e-mails and the scenarios that are increasingly elaborate. Faced with these threats and more broadly to counter the so-called “social engineering” techniques used by malicious people, it
Objective: To make users aware of manipulations carried out by telephone or email that impersonate the organisation’s technical support. Key points: – What is a fake technical support scam? – What methods are used by malicious individuals? – What are their motivations? – Illustration by a concrete case – How to protect yourself from this
Objective: To raise awareness of manipulations carried out by telephone or email impersonating an executive, which aim to get the victim to transfer funds to a fraudulent account. Key points: – What is the CEO fraud / CEO scam, also known as Business email compromise(BEC)? – What methods are used by malicious individuals? – What are
Objective: To make users aware of manipulations carried out by telephone or messenger impersonating a regular supplier in order to transfer payments to its account. Key points: – What is IBAN fraud? – What is the modus operandi used by malicious individuals? – What are the right reflexes to adopt? Duration: 3 minutes Format: Video
Objective: Identify manipulation techniques that exploit the human flaw. Know how to detect the main frauds targeting employees. Part 1 – CEO Fraud – What is the CEO fraud / CEO scam, also known as Business email compromise(BEC)? – What methods are used by malicious individuals? – What are their motivations? – Illustration by a concrete
Objective: To identify behaviours to avoid with online devices or services for personal use. Key points: What is BYOD? Use of personal messaging Use of USB sticks Sending of personal data to online storage services such as “drive”. Good practice of separating uses Duration: 2min30 Format: Microlearning video
Objective: To distinguish between administrator rights and user rights. Stay alert to external threats. Key points: Separate rights: administrator and user Be vigilant with external providers who request rights Use malware detection tools Download software from publishers’ sites or those validated by the organization Limit the use of removable media (USB keys, external hard drives,
Objective: To understand the importance of updating all your systems Key points: Risks of an outdated system Consequences for an organization Illustration by a concrete case study Duration: 2 minutes Format: Microlearning video
Objective: To limit the dissemination of personal data Key points: Vigilance over personal data entered in online forms Use of public data by hackers Data disseminated on social networks Security and privacy settings on online services and terminals Duration: 2 minutes Format: Microlearning video
Objective: To be aware of the risks regarding data when using a smartphone or a tablet Key points: Illustration of the use of a personal smartphone in a professional context Vigilance over permissions granted to installed apps Reporting in case of loss or theft Duration: 2 minutes Format: Microlearning video
Objective: To protect against theft of business data when travelling Key points: Illustration of a case study in an airport Connecting to public devices: portable charging station… Vigilance regarding USB keys Exchanging data by phone or working on a laptop in a public place Risks of loss or theft of a computer or a smartphone
Objective: To securely connect to Wi-Fi at home or in a public place Key points: The consequences of unsecured Wi-Fi access Illustration by a case study of compromised Wi-Fi access at home Best practices to secure the Wi-Fi of your Internet box Vigilance with public Wi-Fi hotspots Use of a VPN connection Duration: 2min30 Format:
Objective: To choose strong passwords Key points: The consequences of weak or unchanged passwords Use of different passwords for different services Technique to build a strong password Good practices on passwords storage Duration: 3 minutes Format: Micro-learning video
Key points: Analysing an email: sender, recipient, content, link hovering… Analysis of a phishing email case with the highlighting of suspicious clues Be vigilant before opening an attachment Reporting suspicious e-mails In summary, the good reflexes Duration: 3min30 Format: Microlearning video + case study
The European Union has formalized in 2016 a new regulation on the protection of personal data, which is applicable from May 25, 2018. This regulation introduces new rights for European citizens in terms of protection of privacy and therefore new obligations for organizations and companies. It involves a profound change in practices related to the
Themes Today, ransomware is the first vector of contamination. It is a new cyber threat in full expansion. These malwares that demand a ransom in exchange for your data contaminate thousands of computers every day. Faced with this threats , it has become essential to raise awareness among employees to limit the exposure of your
Defined by the ANSSI (French National Agency for Information Systems Security) training centre and validated by the agency’s technical experts, the content of this module enables you to understand the 12 best practices in information system security in 30 minutes: Choosing passwords Regularly update your software Know your users and service providers well Carry out
Themes Phishing has been used for many years by hackers. However, this phishing technique has been perfected over time, both in terms of the form of these false e-mails and the scenarios that are increasingly elaborate. Today, phishing is also the first vector of contamination of a new cyber threat in full expansion: ransomware. These