Courses
Safety Training
HR Compliance
Training
Soft Skills
Training
OSHA Requirements
Training
Search By Industry
Training Shorts
Course Packages
About Us
Resources
Contact Us

Watch Course Preview

Cybersecurity Protecting Your Digital Workspace Training Course

Watch Course Preview

Protect against physical & digital theft. Learn about common cyber threats like malware, ransomware, hacking & steps to protect against them. Reflect on your security practices & improve protection of sensitive info.

13 minutes   |   SKU: AT018    |    Language(s): EN / ES / FR    |    Produced 2022

SKU:

AT018

Language(s):

EN / ES / FR

Updated:

2022

Length

13 minutes

Training Objectives

Identify non-digital theft methods and their digital counterparts
Understand common cyber threats, such as malware and hacking
Reflect on personal security practices and status as a target
Learn how to protect sensitive information against cyberthreats

Course Overview

Think about the different ways your information can be stolen non-digitally:  discarded documents are shuffled through, PINs and passcodes are observed while you input them, passwords that are written down are easy prey, sensitive documents can be stolen; your license and other important cards can be taken from a wallet or purse.  Now consider how you protect against these attacks:  security guards patrol a building, alarm systems track movement and facility access, records are locked up, discarded documents are properly disposed of. 

These non-digital attacks – and the security measures we take to guard against them, each have a digital counterpart.  In fact, since these threats occur invisibly, they can be even more invasive, effective, and difficult to counter.

So what are the main types of cyber threats your organization is likely to face? Some of the most common threats include malware, ransomware, phishing, hacking, distributed denial-of-service, and even threats from on-site personnel. 

In this training, you will learn about typical cyberthreats, reflect on the security of your own sensitive information, consider your status as a target, will learn about the steps of cyberattacks, and explore how everyone involved can better protect against cyberthreats.

This program is available with Spanish and French closed captions.

Compliance Standards & Regulations

This course references the standards and regulations listed below.

REG (CFR 45 160, 162; 164)

Super Flexible Formatting

You’ll never find yourself scratching your head, trying to figure out why
you can’t get our videos to play or courses loaded into any platform.

Access courses
in our EHS Software.

View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.

Load courses
into your platform.

Each title includes an embed
feature that allows users to add
videos to their existing training
platform or LMS.

Access courses
in our LMS.

View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.

Not Ready to Sign Up?
No Worries. Here’s Some Helpful Info.

How does the course use real-world analogies to explain digital security?


It compares non-digital attacks (like stealing wallets or reading written passwords) and physical security measures to their digital counterparts.


What specific characteristics make digital threats potentially more dangerous than physical ones?


Because they occur invisibly, they can be even more invasive, effective, and difficult to counter.


What specific examples of non-digital information theft are listed?


Examples include shuffling through discarded documents, observing PINs being input, and finding passwords written down.


What are the main types of cyber threats the organization is likely to face according to the text?


Common threats include malware, ransomware, phishing, hacking, distributed denial-of-service, and threats from on-site personnel.


Beyond learning about threats, what self-reflective exercise does the training encourage?


Participants are encouraged to reflect on the security of their own sensitive information and consider their status as a target.


Disclaimer: The Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7421) aims to strengthen cybersecurity through R&D, education, awareness, and preparedness. Federal Law prohibits computer-based fraud and related activities (18 U.S.C 1030). Additional laws and standards on cybersecurity exist. This training does not, and is not intended to, constitute legal advice. This training is for general informational purposes only. The steps we provide to protect against cyberattacks will help, but ultimately your safety, program development, and implementation are up to you.