Identify and report online security threats of cyber security breaches in the workplace by understanding the following: Follow internal policies, procedures and plans relating to potential online security breaches. Learn how to identify features of common types of potentially fraudulent communications including but not limited to:
โข Common types of online scams and security risks, including phishing scams
โข Common techniques of phishing and spear phishing used by attackers, including:
โข spam email and SMS text
โข Social engineering, including telephone calls, social media and website requests for information.
โข Learn how to implement techniques to verify suspicious requests for information including indicators of insecure connection to websites, in particular where data is being collected.