SecurityIQ Release Blitz – Social Media & Mobile Device Training

The latest SecurityIQ update was designed to mitigate common behaviors when employees are at their most vulnerable – break time! With four new training modules and four additional microlearning videos, you can educates learners on social media and mobile device best practices, and how their engagement can put your data at risk.      


Four New Training Tools

Social media can be a useful tool, or great stress reliever during a break, but appropriate care should be taken when sharing personal information on social networks and clicking links shared by others. Set your team up for success with our new training tools.      

  • Safe Use of Social Media

Covers the precautions you should take when making public posts and provides guidance on how to spot harmful links.

  • Social Engineering Defenses

Shows you how to recognize and prevent social engineering attacks.

  • Updates & Patches

Teaches the importance of regular patches and updates, and also details how to avoid malicious updates from untrusted sources.

  • Protecting Mobile Devices

Walks through the steps you can take to protect your device from prying eyes and theft.

Microlearning Series!  Four New Videos Available

Learners pressed for time? Our microlearning series accommodates your fast-paced environment with the convenience of these 60-second training videos, highlighting important awareness topics to keep your workforce sharp. These informative shorts use actors, professionally produced scenes and compelling narrative. Check out our new additions!  Reinforce the importance of mobile device best practices at work.

  • How Secure Is Public Wi-Fi?

Explains the risks of connecting to public Wi-Fi networks, including how sensitive information can be intercepted by attackers.

  • Where Is Your Device?

Details the importance of physical security and frequent data backups.

  • Who Can You Trust?

Highlights the risks of disclosing patient information without first verifying requester identity.

  • Antivirus

Details the (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Jenna Hulbert. Read the original post at: