Identify and report online security threats of cyber security breaches in the workplace by understanding the following: Follow internal policies, procedures and plans relating to potential online security breaches. Learn how to identify features of common types of potentially fraudulent communications including but not limited to:
• Common types of online scams and security risks, including phishing scams
• Common techniques of phishing and spear phishing used by attackers, including:
• spam email and SMS text
• Social engineering, including telephone calls, social media and website requests for information.
• Learn how to implement techniques to verify suspicious requests for information including indicators of insecure connection to websites, in particular where data is being collected.