
Prevent Data Breaches and Phishing Attacks
Course Video Preview
Social Engineering attack: A business receives a call from a engineer pretending to be IT to gain user credentials to take over the system.Key Concepts
- Introduction to information security and the common threats to your organization
- Identifying scenarios that leave corporate and personal data at risk
- Practical steps for non-IT professionals to create strong login credentials
- Avoiding online scams, social engineering cons, phishing attacks, malware, spyware, and ransomware
- Engaging in network security, mobile device protection, and safeguarding organizational assets
Course Features
- Access to our Anonymous Ask the Expert tool
- Rich video scenarios based on real-world events
- Built-in employee sentiment surveys
- 50+ Machine Translation Options
- Optional program timer
- Policy acknowledgement tool
- Extensive customization options

Lessons
Seeing the Risks and Meeting the Challenges
Password Strength and Security
Social Engineering
Phishing Attacks
Malware and Spyware Prevention
Web-Based Attacks
Personal Devices
Ransomware
Policies
Provide Your Feedback
Relevant Courses
Complementary Microlessons
Recommended Resources
From ‘Ask the Expert’
Emtrain’s Ask the Expert feature enables users to ask questions about compliance, bias, harassment, and diversity & inclusion as they come up. It’s all confidential, and answers are sent straight to their inbox. Search the questions below and see the Experts answers.
Q
What are common signs of a phishing email?
Thanks for asking. Signs include poor spelling or grammar, email addresses that don’t match the sender’s name, urgent requests for money or information, and links that look suspicious when you hover over them. If it feels “off,” it probably is.
Q
How should I handle a suspicious link or attachment?
Don’t click it or open it. Report it right away through your company’s security process, usually by forwarding to IT or using a phishing report button. Deleting it without reporting means IT won’t know to warn others.
Q
How can I protect company data when working remotely?
Use company-approved devices, connect through secure Wi-Fi or VPN, and avoid saving files on personal systems. Lock your screen when stepping away, even at home. Small habits make a big difference in keeping data safe.
Q
What are the signs my computer has been hacked, and what should I do first?
Warning signs include your device running unusually slow, pop-ups appearing, programs opening on their own, or passwords suddenly not working. If you suspect hacking, disconnect from the internet and notify IT immediately. Don’t try to fix it yourself.
Q
What’s the safest way to create and manage strong passwords?
Strong passwords are long (12+ characters), include a mix of letters, numbers, and symbols, and avoid personal details. Using a password manager is a great way to keep them secure and avoid reusing the same password across accounts.