Identify cybersecurity risks such as phishing, malware, and weak passwords
Explain best practices for secure password management and data protection
Discuss safe internet use, email security, and recognizing suspicious activity
Understand the importance of access control and multi-factor authentication
Imagine a routine workday for pipeline employees turning into a full-blown crisis. Hackers infiltrated the company’s network using a compromised password. Their attack wasn't just a minor inconvenience; they encrypted critical business systems, effectively holding the company's operations hostage. The demand? Millions in ransom.
Faced with this dire situation, the company had no choice but to shut down its entire fuel distribution network. The ripple effect was immediate and devastating: massive fuel shortages and panic buying erupted across the East Coast of the United States. The question becomes: What immediate actions could have been taken to avoid such catastrophic consequences and the millions in damages incurred?
This scenario highlights the absolute necessity of robust cybersecurity. Just as physical security measures protect a workplace from physical threats, cybersecurity is paramount in safeguarding digital systems and sensitive information. A single vulnerability – a weak password, a deceptive phishing email, or an unpatched system – can expose an entire organization to catastrophic data breaches, crippling financial losses, and significant operational disruptions.
This course is designed to equip employees with the essential knowledge and best practices needed to protect workplace systems, data, and networks from the ever-present threat of cyberattacks. Participants will delve into the fundamentals of cybersecurity, gaining a solid understanding of the various types of cyber threats they may encounter.
By the end of this course, employees will be better prepared to defend against cyber threats and contribute to a more secure workplace.
This program is available with Spanish and French closed captions.
View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.
Each title includes an embed
feature that allows users to add
videos to their existing training
platform or LMS.
View this course in a classroom
environment, or assign it to your
team individually with testing
and recordkeeping capabilities.
Employees should be cautious of unsolicited emails or messages that create a sense of urgency, request sensitive information, or contain unfamiliar links or attachments. Indicators of phishing include misspellings, generic greetings, and email addresses that don't match the sender.
When working remotely, use devices approved by your organization and ensure they are equipped with updated security software. Connect to the internet through secure networks, preferably using a Virtual Private Network (VPN). Be cautious with public Wi-Fi, as it can be unsecured and susceptible to eavesdropping.
Keeping software and systems updated ensures that security vulnerabilities are patched, reducing the risk of exploitation by cybercriminals. Outdated software can be a gateway for attacks, as known vulnerabilities can be targeted. Regular updates help maintain the integrity and security of systems.
When traveling, use your cellular network or a VPN to get secure internet access. If you must use a public network, ensure it is reputable and refrain from accessing sensitive information, such as online banking.
Be familiar with your work environment and report any activity or objects that may appear suspicious or out of place. As an employee, you can be one of the most effective security tools in your organization by remaining aware at all times and reporting anything unusual.
Disclaimer: The information provided on this page is subject to change and is for promotional and informational purposes only. Prior to acting on the information contained on this page, verify all information against the latest OSHA and applicable standards, regulations, and guidelines. Please also contact us with any questions you have related to this information. Under no circumstances will Atlantic Training, LLC be held responsible for direct, indirect, consequential, or incidental injuries or damages, or any damages or injuries whatsoever, whether resulting from contract, negligence, or other torts, related to the utilization of this information or the contents of this page. Atlantic Training retains the right to incorporate, remove, or adjust the contents on this page without prior notice.