Most data breaches occur when a hacker tricks an employee to click on a link and open a file.
Are your people trained to be cyber safe?

People are far easier to hack than computers.

You may do training once a year, but months later what will your employees remember? Prevent successful attacks by arming your people with daily online security training with OttoSecure.

Your learners will discover:

  • How to prevent a successful attack by understanding how criminals use psychology to their advantage
  • How to create and implement a secure password system
  • Often forgotten safe browsing techniques
  • Ways to avoid malware and, in the case of infection, prevent it from spreading
  • How to align physical security and online security in order to create a stronger defense perimeter
Topic screen on mobile device - OttoSecure Cyber Security TrainingConcept screen on mobile device - OttoSecure Cyber Security Training

OttoSecure Curriculum

OttoSecure offers a robust program designed to keep your business safe from cyber-attacks by making your team your first line of defense.

Within OttoSecure, you'll have access to:

  • 5 topics
  • Over 80 concepts
  • A total of over 320 activities
You can customize the content to align with your internal security practices (or we can customize it for you).

Included in the OttoSecure curriculum:

Computer Security
  • Social Media Risks
  • Personal Risk in Social Media
  • Avoiding Phishing in Social Media
  • Social Media and Work
  • Encryption and Security
  • Using WiFi Securely
  • What is a Firewall?
  • How does a Firewall Work?
  • What Browser Should You Use?
  • Why You Should Avoid Adobe Flash
  • Securing Your Devices
  • Securing Your Mobile Phone
  • Using Mobile Apps Safely
  • Using Public WiFi Securely
Password Security
  • What is Password Security?
  • Weak Password Risks
  • Secure Password Best Practices
  • Protecting Your Passwords
  • Creating a Secure Password
  • Password Crackers
  • Password Encryption
  • Password Systems
  • What is Two-Factor Authentication (2FA)?
  • Using Two-Factor Authentication (2FA)
  • Password Managers
Social Engineering Security
  • What is Phishing?
  • What Happens in a Phishing Attack?
  • Who Can Be Targeted With a Phishing Attack?
  • What is the Impact of a Successful Phishing Attack?
  • Recovering from a Successful Attack
  • Phishing Attacks: Baiting
  • Phishing Attacks: Fear of Loss
  • Phishing Attacks: Fear of Missing Out
  • Phishing Attacks: Quid Pro Quo
  • Phishing Attacks: Spear Phishing
  • Phishing Attacks: Watering Hole
  • Phishing Attacks: Spoofing
  • Phishing Attacks: Pretexting
  • Preventing Phishing Attacks
  • Preventing Phishing Attacks: Email (Basic)
  • Preventing Phishing Attacks: Email (Advanced)
  • Preventing Phishing Attacks: Phone Calls
  • Preventing Phishing Attacks: In-Person
  • Preventing Phishing Attacks: Smishing
  • Preventing Phishing Attacks: USB Devices
  • Preventing Phishing Attacks: Websites
  • Preventing Phishing Attacks: Social Media
  • Preventing Phishing Attacks: Vishing
  • What is Social Engineering?
  • How do Criminals Use Social Engineering?
  • How to Prevent a Social Engineering Attack
  • What are the Four Social Engineering Methods?
  • Social Engineering Methods: Helpfulness
  • Social Engineering Methods:  Technical
  • Social Engineering Methods:  Familiarity
  • Social Engineering Methods: Intimidation
  • What is Malware?
  • Active vs Passive Infections
  • Types of Malware
  • Types of Malware: Adware
  • Types of Malware: Keylogger
  • Types of Malware: Spyware
  • Types of Malware: Ransomware
  • Types of Malware: Worms and Viruses
  • Types of Malware: Trojan Horse
  • The Impact of Malware
  • How Malware Spreads
  • Preventing Malware from Spreading
  • Preventing a Malware Attack
  • Preventing a Malware Attack: Antivirus Scanning
  • Preventing a Malware Attack: Avoiding Bad Neighborhoods
  • Preventing a Malware Attack: Browser Safety
  • Preventing a Malware Attack: Browser Pop-ups
  • Preventing a Malware Attack: What is a Browser Pop-up?
  • Preventing a Malware Attack: Safely Closing a Browser Pop-up
  • Preventing a Malware Attack: Browser Pop-up On-close Attacks
  • Preventing a Malware Attack: Antivirus Software
  • Preventing a Malware Attack: Fake Antivirus Software
Physical Security
  • Defining Physical Security
  • Defining Physical Security
  • Lost or Stolen Mobile Devices
  • Document Security

Experience OttoSecure

OttoSecure is yours when you sign up for any paid OttoLearn plan. That's a $25/user/month value for FREE when you purchase one of our paid OttoLearn plans:

  • Team Plan
  • Growth Plan
  • Enterprise Plan

Content customization packages are available, to match your exact internal security policies.

Sign up for a paid plan & get OttoSecure FREE