Topic Category: Information Security
Social Media Risks and Best Practices Social Media, including YouTube, Facebook, LinkedIn, Reddit, Twitter, Snapchat, Instagram, Review sites, etc. are part of our everyday life. Fraudsters know this. Fraudsters …
Information Security Quiz You will need to receive a 90% or higher on this quiz
Review Your Company’s Information Security Policy Open and read your company’s security policy: (Policy will open in a new window.) Click below to start the quiz. This will …
Non Compliance Consequences Not complying with the best practices in this training can have serious consequences for you personally, your cardholders and your company. Below are some consequences that …
Data Retention Best Practices What To Keep: Make sure to keep all emails and files that relate to any of the situations below. A complaint made by a cardholder Information …
Working in Public Places Best Practices There are going to be times when you need to complete work outside the office. Keep these best practices in mind: Talking on …
Building Security Best Practices Tailgating: Never let somebody follow you into the office without swiping or showing their security credentials. This is called tailgating. Even if you know the person, …
Software Warnings and Best Practices Viruses and Other Risks: There are many risks out there today that can affect computers and wreak havoc in our lives. The most commonly known …
Internet Usage Best Practices What sites to avoid?: In addition to avoiding the common “no-no” sites on your computer, such as pornography, illegal music, and illegal software downloads, you …
Phone Security Best Practices Voicemail: Voicemail can be a powerful tool for hackers and social engineers. Make sure you have a strong password set up on your voicemail to prevent …