Description
Instructor
BankersHub Membership
Understand the risks to your data through social engineering and email phishing attacks.
In today's digital age, strong cybersecurity extends beyond technology safeguards, recognizing the human factor as a critical link in the security chain. Despite increased investment in technology, hackers often exploit human errors through low-tech social engineering attacks, leading to significant data breaches and security incidents. This course aims to provide a comprehensive understanding of the risks associated with social engineering attacks on systems containing sensitive electronic data. It will cover various attack methods employed by hackers, shed light on how these attacks operate, and outline essential steps to safeguard data and systems. The prevalence of phishing emails is a common challenge, with scammers continually devising new strategies to bypass filters. Individuals receive an average of 3-5 phishing emails weekly, putting them at risk of engaging in actions that could have severe consequences. To address this, the course will focus on educating participants on how to identify phishing emails and offer practical tips to help them avoid falling victim to such scams. This knowledge is crucial for organizations of all sizes to mitigate risks and protect against potential security threats.
Agenda
Understand the Cyber Threat Landscape
- Identify and Understand Social Engineering Techniques
- Understand the Types of Human Error That Can Place an Organization at Risk
Understand Regulatory Risks Associated With Data Breach
- Federal Law Reporting Requirements
- State Law Reporting Requirements
- Regulatory Enforcement Background
Understand Effective Measures That Can Be Taken to Mitigate the Effect of Human Error and Social Engineering Attacks
- Training and Awareness Best Practices
- Technology Best Practices
What Is Phishing and Why You Should Be Concerned
How Do You Become a Victim of Phishing
5 Ways to Identify Phishing and Avoid Becoming a Victim
Some Real-Life Examples
Phishing Simulations
Questions and Answers
Concluding Remarks