Occupational Cybersecurity in the Office: Awareness and Best Practices
This CBT introduces cybersecurity as a shared workplace responsibility. We designed this training to show how daily work behaviors—email usage, device handling, and collaboration tools—directly impact organizational security. By mastering these best practices, you reduce cyber risk at the individual level and protect the company from sophisticated, modern attacks that bypass traditional firewalls.

What You Will Learn
Communicate securely across platforms and avoid bypassing security controls for convenience.
Protect sensitive corporate data by avoiding public Artificial Intelligence tools that retain data for training models.
Identify and defend against Business Email Compromise (BEC) attacks that use urgency and authority instead of malicious links.
Establish unique, 20-character passwords using an enterprise-approved Password Manager to combat automated credential stuffing.
Respond effectively to MFA Fatigue attacks by denying repeated approval requests and immediately reporting the incident.
Maintain strict network discipline in public spaces by utilizing corporate VPNs and cellular hotspots to avoid "Evil Twin" network traps.
Topics Covered
Recommended For
Training Features
Animated explainer videos demonstrating "Evil Twin" fake Wi-Fi access points.
Real-life scenarios of MFA Fatigue and Push Bombing techniques used by advanced hacking groups.
Interactive questions to practice "out-of-band" human verification for urgent wire transfer requests.
Knowledge checks on isolating vulnerable smart home devices using a dedicated Guest Network.
Final assessment to validate secure communication and identity defense habits.
Policy & Compliance relevance
Information Security Policy
Remote Work and Bring Your Own Device (BYOD) Policy
Data Loss Prevention (DLP) and Data Handling Guidelines
Generative AI Acceptable Use Policy
How this training reduces risk
- Completing this CBT helps reduce human risk by improving awareness, strengthening secure behavior, and minimizing the likelihood of security incidents.
- Prevents critical corporate data leaks caused by Shadow AI inputs and unauthorized email forwarding.
- Thwarts automated credential stuffing attacks through strict, company-wide password manager adoption.
- Part of continuous risk evaluation.
Tracking & Reporting
Training completion and assessment results are recorded for security monitoring, risk assessment, and compliance reporting.
- Duration: 15mins
- Level: Intermediate
- Category: Security Awareness
- Audience:All EmployeesRemote WorkersIT Staff