CYBER MONDAY SPECIAL: Get Ready for 2023 with 23% Off Your Order & $12 Shipping — use code CYBER23  (exclusions apply)

 

0
You have no items in your shopping cart.
Search

Cyber Security & Data Privacy - Training Course (1 Year)

HRdirect has partnered with Clear Law Institute to provide this interactive online training course that teaches employees how to protect confidential information from accidental disclosure or theft. Employees will learn:

  • The legal requirements for data privacy
  • How to identify which information is confidential
  • Common schemes that criminals use to access our technology systems and our confidential information
  • Best practices for email, internet, physical, and password security
  • How to report a potential data breach and more

See more details...


Pricing shown below is per seat/employee and requires an annual renewal.

This product is non-refundable and is not eligible for discounts.

SKU: D5005
Free shipping
PRICE BREAKS - The more you buy, the more you save
Quantity
1+
11+
51+
151+
Price
$40.00
$30.00
$26.00
$20.00
$40.00
decrease increase

The email address provided at checkout will be used to set up your account with Clear Law Institute.  You should receive an email with login information within one business day after receiving your confirmation email.

Through a series of interactive scenarios and learning games, employees learn the nuances of the following topics:

 

Data Privacy Laws

  • Legal requirements
  • Duty to report a breach
  • Common schemes that criminals use to access our technology systems and our confidential information
  • Game: Classifying information as protected, sensitive, non-public, or public

Security Threats Overview

  • Hacking
  • Ransomware
  • Social Engineering
Email Security
  • Clicking links
  • Emails to personal accounts
  • Phishing schemes
  • Phishing red flags
  • Spear phishing
  • Whaling
  • Phishing by Phone/Text
Internet Security
  • Watering Hole
  • Pharming
  • Installing unauthorized software
  • WiFi networks
  • File sharing services
  • Use of social media
Password Security
  • Simple Passwords
  • Names and birthdates
  • Complex characters
  • Writing down passwords
  • Non-secure document
  • First letter of lyrics
  • Reusing passwords
  • Changing passwords
  • Sharing passwords
  • Password management software
Physical Security
  • Tailgaters
  • Leaving out confidential information
  • Easy access
  • Locking screens
  • Shared workspaces
  • Printers
  • Proper disposal
  • Thumb drives
  • Insider threats
  • Watch my device
  • Theft
Reporting a Data Breach
  • Duty to report
  • Data breach examples
  • Red flags
  • How to report
  • Retaliation & confidentiality

 

Each course:

  • Can be accessed anywhere, anytime on a computer, tablet, or smartphone

Through a series of interactive scenarios and learning games, employees learn the nuances of the following topics:

 

Data Privacy Laws

  • Legal requirements
  • Duty to report a breach
  • Common schemes that criminals use to access our technology systems and our confidential information
  • Game: Classifying information as protected, sensitive, non-public, or public

Security Threats Overview

  • Hacking
  • Ransomware
  • Social Engineering
Email Security
  • Clicking links
  • Emails to personal accounts
  • Phishing schemes
  • Phishing red flags
  • Spear phishing
  • Whaling
  • Phishing by Phone/Text
Internet Security
  • Watering Hole
  • Pharming
  • Installing unauthorized software
  • WiFi networks
  • File sharing services
  • Use of social media
Password Security
  • Simple Passwords
  • Names and birthdates
  • Complex characters
  • Writing down passwords
  • Non-secure document
  • First letter of lyrics
  • Reusing passwords
  • Changing passwords
  • Sharing passwords
  • Password management software
Physical Security
  • Tailgaters
  • Leaving out confidential information
  • Easy access
  • Locking screens
  • Shared workspaces
  • Printers
  • Proper disposal
  • Thumb drives
  • Insider threats
  • Watch my device
  • Theft
Reporting a Data Breach
  • Duty to report
  • Data breach examples
  • Red flags
  • How to report
  • Retaliation & confidentiality

 

Each course:

  • Can be accessed anywhere, anytime on a computer, tablet, or smartphone

At some point, nearly every organization will become a victim of a cybersecurity or information security attack. And according to the FBI, since the beginning of the COVID-19 crisis, there has been a 300% increase in cybercrimes.

 

Cybersecurity attacks can be incredibly costly. For example, Barbara Corcoran, one of the hosts of the TV show, “Shark Tank,” fell for a $400,000 “phishing” scam. Hackers sent Ms. Corcoran an email that appeared to come from her assistant and included an invoice. While Ms. Corcoran thought she was paying a contractor’s invoice, in reality, she wired $400,000 to a cybercriminal’s overseas bank account.

 

In addition to tricking employees into making fraudulent payments, criminals also attempt to gain access to organizations’ trade secrets and other proprietary information and the confidential information organizations maintain on their employees, customers, and vendors.

 

These data breach incidents can be incredibly costly, harm organizations’ reputations, and lead to litigation.

 

While your organization may have implemented a firewall and antivirus software, more than 90% of data breaches are caused by human error, such as an employee clicking on a link in a suspicious email or falling for a “social engineering” scam. To prevent information security attacks, you must train your employees on how to recognize and report them.

Filters
Sort
display