Bring Your Own Device – BYOD

BYOD, short for “Bring Your Own Device,” is a phrase that refers to the practice of allowing employees to bring their own mobile devices, laptops, or pad computers to work to be used with a company’s systems, software, networks, and data. Imagining bringing a cell phone to work to view a company intranet page or…

Secure Mobile Apps Development

Learn the risks associated with mobile applications/data and provides recommendations on how to protect against them and other such threats. In order to obtain a  secure mobile solution, an organization needs to have secure devices, a secure network, and a secure application. If any of the elements are compromised, the solution is at risk. Security…

Cloud Security

Definition Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models,…

Privacy – PII & PHI

Personally identifiable information Personally identifiable information (PII) is any data that could potentially identify a particular individual. PII can be any information that can be used to distinguish one person from another and that can be utilized for de-anonymizing anonymous data. PII can be sensitive or non-sensitive. Non-sensitive PII is information that can be transmitted in an…

Cyber Security – Essentials for Executives

This module provides executives and managers with an overview of issues and activities associated with cyber security. Managers will receive information on various topics that build their knowledge and hone their decision-making processes in regards to cyber security threats. This course provides an upper-level awareness of cyber threats, vulnerabilities, and countermeasures. It explains potential vulnerabilities…

Social Engineering – How to Block It

No matter how strong a company’s security is end-users will often be the weakest link in the security chain. Hackers can exploit an employee’s trusting nature, naivety, gullibility, or just the harried state of many workers, with the end goal being to gain unauthorized access to corporate IT systems using social engineering tactics. In this…

Malware – Protection against Malware

Malware is any malicious software that can install itself on a victim’s computer or mobile device. It may slow performance, monitor usage, steal sensitive information, and gain privileged access. This module will highlight the different types of malware including Adware, Backdoors, Keyloggers, Rootkits, Spyware, Trojan Horses, URL Injectors, Viruses, and Worms The module will also…

Ransomware protection

Ransomware is a type software that cyber criminals use to encrypt valuable, sentimental, or sensitive data with the goal of demanding money (i.e. ransom) to unencrypt the affected data. If the data is left encrypted it is unusable to its owner. While there are a variety of different ransomware programs available on the Internet, how…

Phishing – Protecting Against It

Phishing is the act of attempting to steal a person’s data (e.g., name, address, phone number, SIN), credit card information, and other sensitive information by disguising oneself as a trustworthy source. While phishing has been around for a long time, even in modern times, people regularly fall victim to it. Still closely identified with email,…