Topic Category: 2018
Social Media Risks and Best Practices Social Media, including YouTube, Facebook, LinkedIn, Reddit, Twitter, Snapchat, Instagram, Review sites, etc. are part of our everyday life. Fraudsters know this. Fraudsters …
Information Security Quiz You will need to receive a 90% or higher on this quiz
Review Your Company’s Information Security Policy Open and read your company’s security policy: (Policy will open in a new window.) Click below to start the quiz. This will …
Non Compliance Consequences Not complying with the best practices in this training can have serious consequences for you personally, your cardholders and your company. Below are some consequences that …
Data Retention Best Practices What To Keep: Make sure to keep all emails and files that relate to any of the situations below. A complaint made by a cardholder Information …
Working in Public Places Best Practices There are going to be times when you need to complete work outside the office. Keep these best practices in mind: Talking on …
Building Security Best Practices Tailgating: Never let somebody follow you into the office without swiping or showing their security credentials. This is called tailgating. Even if you know the person, …
Software Warnings and Best Practices Viruses and Other Risks: There are many risks out there today that can affect computers and wreak havoc in our lives. The most commonly known …
Internet Usage Best Practices What sites to avoid?: In addition to avoiding the common “no-no” sites on your computer, such as pornography, illegal music, and illegal software downloads, you …
Phone Security Best Practices Voicemail: Voicemail can be a powerful tool for hackers and social engineers. Make sure you have a strong password set up on your voicemail to prevent …