Formations

Download security

awareness security download apps

Objective: To securely download programs Key points : – Risks of downloading applications – Use trusted or official sites – Use of application store authorised by the organisation – Consulting your IT department to install software Duration: 2 minutes Format: Video micro-learning

Phishing Awareness

Phishing learning

Themes Phishing has been used for many years by hackers. However, this phishing technique has been perfected over time, both in terms of the form of these false e-mails and the scenarios that are increasingly elaborate. Faced with these threats and more broadly to counter the so-called “social engineering” techniques used by malicious people, it

Tech support scam

arnaque faux support technique

Objective: To make users aware of manipulations carried out by telephone or email that impersonate the organisation’s technical support. Key points: – What is a fake technical support scam? – What methods are used by malicious individuals? – What are their motivations? – Illustration by a concrete case – How to protect yourself from this

CEO Fraud

ceo fraud

Objective: To raise awareness of manipulations carried out by telephone or email impersonating an executive, which aim to get the victim to transfer funds to a fraudulent account. Key points: – What is the CEO fraud / CEO scam, also known as Business email compromise(BEC)? – What methods are used by malicious individuals? – What are

IBAN Fraud

Objective: To make users aware of manipulations carried out by telephone or messenger impersonating a regular supplier in order to transfer payments to its account. Key points: – What is IBAN fraud? – What is the modus operandi used by malicious individuals? – What are the right reflexes to adopt? Duration: 3 minutes Format: Video

Fraud and Social engineering

Ingénierie sociale micro learning sensibilisation

Objective: Identify manipulation techniques that exploit the human flaw. Know how to detect the main frauds targeting employees. Part 1 – CEO Fraud – What is the CEO fraud / CEO scam, also known as Business email compromise(BEC)? – What methods are used by malicious individuals? – What are their motivations? – Illustration by a concrete

Separate personal and professional use

BYOD usage personnel professionnel

Objective: To identify behaviours to avoid with online devices or services for personal use. Key points: What is BYOD? Use of personal messaging Use of USB sticks Sending of personal data to online storage services such as “drive”. Good practice of separating uses Duration: 2min30 Format: Microlearning video

Knowing your users and providers

Objective: To distinguish between administrator rights and user rights. Stay alert to external threats. Key points: Separate rights: administrator and user Be vigilant with external providers who request rights Use malware detection tools Download software from publishers’ sites or those validated by the organization Limit the use of removable media (USB keys, external hard drives,

Software updates

mise à jour des logiciels

Objective: To understand the importance of updating all your systems Key points: Risks of an outdated system Consequences for an organization Illustration by a concrete case study Duration: 2 minutes Format: Microlearning video

Protect your digital identity

Objective: To limit the dissemination of personal data Key points: Vigilance over personal data entered in online forms Use of public data by hackers Data disseminated on social networks Security and privacy settings on online services and terminals Duration: 2 minutes Format: Microlearning video

Smartphone: security of personal and professional data

Objective: To be aware of the risks regarding data when using a smartphone or a tablet   Key points: Illustration of the use of a personal smartphone in a professional context Vigilance over permissions granted to installed apps Reporting in case of loss or theft Duration: 2 minutes Format: Microlearning video

Protecting your data when travelling

Objective: To protect against theft of business data when travelling Key points: Illustration of a case study in an airport Connecting to public devices: portable charging station… Vigilance regarding USB keys Exchanging data by phone or working on a laptop in a public place Risks of loss or theft of a computer or a smartphone

Wi-Fi security when teleworking or travelling

wifi télétravail déplacement

Objective: To securely connect to Wi-Fi at home or in a public place Key points: The consequences of unsecured Wi-Fi access Illustration by a case study of compromised Wi-Fi access at home Best practices to secure the Wi-Fi of your Internet box Vigilance with public Wi-Fi hotspots Use of a VPN connection Duration: 2min30 Format:

Password security

sécurité des mots de passe

Objective: To choose strong passwords Key points: The consequences of weak or unchanged passwords Use of different passwords for different services Technique to build a strong password Good practices on passwords storage Duration: 3 minutes Format: Micro-learning video

Phishing : Identifying a malicious e-mail

micro Learning phishing

Key points: Analysing an email: sender, recipient, content, link hovering… Analysis of a phishing email case with the highlighting of suspicious clues Be vigilant before opening an attachment Reporting suspicious e-mails In summary, the good reflexes Duration: 3min30 Format: Microlearning video + case study

GDPR Awareness

The European Union has formalized in 2016 a new regulation on the protection of personal data, which is applicable from May 25, 2018. This regulation introduces new rights for European citizens in terms of protection of privacy and therefore new obligations for organizations and companies. It involves a profound change in practices related to the

Ransomware, how to protect yourself ?

sensibilisation micro learning ransomware

Themes Today, ransomware is the first vector of contamination. It is a new cyber threat in full expansion. These malwares that demand a ransom in exchange for your data contaminate thousands of computers every day. Faced with this threats , it has become essential to raise awareness among employees to limit the exposure of your

Cybersecurity basics

Defined by the ANSSI (French National Agency for Information Systems Security) training centre and validated by the agency’s technical experts, the content of this module enables you to understand the 12 best practices in information system security in 30 minutes: Choosing passwords Regularly update your software Know your users and service providers well Carry out

Phishing & Ransomware Awareness

Themes Phishing has been used for many years by hackers. However, this phishing technique has been perfected over time, both in terms of the form of these false e-mails and the scenarios that are increasingly elaborate. Today, phishing is also the first vector of contamination of a new cyber threat in full expansion: ransomware. These