We spend 6 ½ hours a day, on average, with our electronic devices. This PDF shows creative, easy ways to make that time more productive and less frustrating.
Fascinating statistics about global social media usage, accompanied by simple yet memorable tips for ensuring your family's safety when engaging with popular social platforms.
Those who designed social media platforms have unparalleled insight into their inner workings. This video features quotes from the Netflix documentary "The Social Dilemma," offering perspectives on how these creators utilize social media.
Parents, wondering what apps your kids are using? Some you know (Facebook, Instagram), and some you don’t (Houseparty, Discord) Are the apps safe? Do they share personal information?
Examples of four social media dangers include LinkedIn/Facebook messages, posting an office photo, an Instagram account verification warning, and text messages from an online game player. Includes clues to watch for.
This video reveals a prevalent and perilous smishing scam, which involves a deceptive alert claiming to suspend smartphone service due to an unpaid bill. But, beware....in reality, its primary purpose is to gather the victim's personal identifiable information (PII).
The email attachment appears authentic, often accompanied by an urgent message, prompting many employees to instinctively download and open it. Through this video, your employees will gain essential knowledge on safeguarding their identities and preventing malware from compromising your company's systems.
This beautifully animated and voiced video explains phishing in plain language that your employees will understand: what phishing is, what to look for, and what to do.
Here’s an easy way to remember how to spot a fake email, text, or social media post. We call it the Blood Pressure Rule. Phishing, smishing and vishing texts or emails can all raise our blood pressure due to their threatening tones and unrealistic promises. Employees learn to stop and take a breath before they "click".
What trusted, familiar brands are used most often in phishing emails? Check out this video and remind your employees not to be convinced just because an urgent message seems to be from a company they trust.
Employees will engage in this interactive, live-scoring quiz comprising five questions that thoroughly explore the most treacherous aspects of business email compromise (BEC). Customized with your company logo.
Voice mails from scammers sound realistic, especially when they’re using AI. This PDF includes an overview of what scammers are after, how they use vishing, and how to recognize it.
Smishing: fake text messages. This PDF provides an overview of the most common types of smishing, what the crooks are after, and how employees can protect themselves.