Build Agile, Prepared and Security-focused Teams
Access Skillsoft's cybersecurity webinar by Brad Puckett, VP Product Content for cybersecurity.
Access on-demand webinar.In today’s boundaryless workplace, comprehensive security is essential. That kind of 360-degree protection requires education and awareness to safeguard identities, data, and devices. Awareness programs help enable security teams to effectively manage their human risk by changing how people think about cybersecurity and helping them practice secure behaviors.
Cybersecurity Awareness Month in October is a special time for us as we collectively come together—industry, academia, and government—to promote the importance of a secure online environment. We know that cybercriminals are persistent and driven, working all day, every day with no days off. That’s why we need to work together on awareness and education year-round and build a culture of cyber defenders.
Everyone has a role to play in cybersecurity, and when we learn together, we are more secure together.
Access Skillsoft's cybersecurity webinar by Brad Puckett, VP Product Content for cybersecurity.
Access on-demand webinar.Skillsoft's Cybersecurity Career Journey is a comprehensive, outcome-oriented collection of prescriptive learning paths designed to provide you with a multi-faceted, blended learning experience.
Learn moreWe have a new Microsoft Certified Cybersecurity Artitect Expert Webinar, and a wide range of Security courses free Microsoft Fundamentals Days.
Learn more
While having a strong password can help keep most bad actors out, it may not keep all out. In this video, James talks about the ways attackers may take advantage of the shortcomings of password authentication and how to avoid becoming a victim.
The cyber myths debunked in this video:
- My password is too strong for an attack
- I’m not important enough to attack
It’s hard to believe that attacks may come from internal sources; for some, it’s the last place they’d expect. But, unfortunately, attackers may be closer than you think. James covers a few examples of security incidents from internal sources and the ways to prevent them.
The cyber myths debunked in this video:
- I can always spot or recognise an attacker or a breach
- We've not been breached before, so our security plan is good enough for the future
- I use security products, so I don't have anything to worry about
“We’re friends, right? My friends wouldn’t try to scam me.” In this video, James breaks down the various ways attackers can use a person’s friends list on social media to gain access to sensitive information.
The cyber myths debunked in this video:
- Those I know through social media can't hurt me
- I only visit common websites, so I'm safe
- I can always spot a scam because they are obvious