OttoSecure

Most data breaches occur when a hacker tricks an employee to click on a link and open a file.
Are your people trained to be cyber safe?

Back to the Marketplace

You may do training once a year, but months later what will your employees remember?

Prevent successful attacks by arming your people with daily online security training with OttoSecure.

People are far easier to hack than computers. You may do training once a year, but months later what will your employees remember? Prevent successful attacks by arming your people with daily online security training with OttoSecure.

Your learners will discover:

  • How to prevent a successful attack by understanding how criminals use psychology to their advantage
  • How to create and implement a secure password system
  • Often forgotten safe browsing techniques
  • Ways to avoid malware and, in the case of infection, prevent it from spreading
  • How to align physical security and online security in order to create a stronger defense perimeter

Included in the OttoSecure Module:

Computer Security
  • Social Media Risks
  • Personal Risk in Social Media
  • Avoiding Phishing in Social Media
  • Social Media and Work
  • Encryption and Security
  • Using WiFi Securely
  • What is a Firewall?
  • How does a Firewall Work?
  • What Browser Should You Use?
  • Why You Should Avoid Adobe Flash
  • Securing Your Devices
  • Securing Your Mobile Phone
  • Using Mobile Apps Safely
  • Using Public WiFi Securely
Password Security
  • What is Password Security?
  • Weak Password Risks
  • Secure Password Best Practices
  • Protecting Your Passwords
  • Creating a Secure Password
  • Password Crackers
  • Password Encryption
  • Password Systems
  • What is Two-Factor Authentication (2FA)?
  • Using Two-Factor Authentication (2FA)
  • Password Managers
Social Engineering Security
  • What is Phishing?
  • What Happens in a Phishing Attack?
  • Who Can Be Targeted With a Phishing Attack?
  • What is the Impact of a Successful Phishing Attack?
  • Recovering from a Successful Attack
  • Phishing Attacks: Baiting
  • Phishing Attacks: Fear of Loss
  • Phishing Attacks: Fear of Missing Out
  • Phishing Attacks: Quid Pro Quo
  • Phishing Attacks: Spear Phishing
  • Phishing Attacks: Watering Hole
  • Phishing Attacks: Spoofing
  • Phishing Attacks: Pretexting
  • Preventing Phishing Attacks
  • Preventing Phishing Attacks: Email (Basic)
  • Preventing Phishing Attacks: Email (Advanced)
  • Preventing Phishing Attacks: Phone Calls
  • Preventing Phishing Attacks: In-Person
  • Preventing Phishing Attacks: Smishing
  • Preventing Phishing Attacks: USB Devices
  • Preventing Phishing Attacks: Websites
  • Preventing Phishing Attacks: Social Media
  • Preventing Phishing Attacks: Vishing
  • What is Social Engineering?
  • How do Criminals Use Social Engineering?
  • How to Prevent a Social Engineering Attack
  • What are the Four Social Engineering Methods?
  • Social Engineering Methods: Helpfulness
  • Social Engineering Methods:  Technical
  • Social Engineering Methods:  Familiarity
  • Social Engineering Methods: Intimidation
Malware
  • What is Malware?
  • Active vs Passive Infections
  • Types of Malware
  • Types of Malware: Adware
  • Types of Malware: Keylogger
  • Types of Malware: Spyware
  • Types of Malware: Ransomware
  • Types of Malware: Worms and Viruses
  • Types of Malware: Trojan Horse
  • The Impact of Malware
  • How Malware Spreads
  • Preventing Malware from Spreading
  • Preventing a Malware Attack
  • Preventing a Malware Attack: Antivirus Scanning
  • Preventing a Malware Attack: Avoiding Bad Neighborhoods
  • Preventing a Malware Attack: Browser Safety
  • Preventing a Malware Attack: Browser Pop-ups
  • Preventing a Malware Attack: What is a Browser Pop-up?
  • Preventing a Malware Attack: Safely Closing a Browser Pop-up
  • Preventing a Malware Attack: Browser Pop-up On-close Attacks
  • Preventing a Malware Attack: Antivirus Software
  • Preventing a Malware Attack: Fake Antivirus Software
Physical Security
  • Defining Physical Security
  • Defining Physical Security
  • Lost or Stolen Mobile Devices
  • Document Security

OttoSecure Image Gallery