CBT

Occupational Cybersecurity in the Office: Awareness and Best Practices

This CBT introduces cybersecurity as a shared workplace responsibility. We designed this training to show how daily work behaviors—email usage, device handling, and collaboration tools—directly impact organizational security. By mastering these best practices, you reduce cyber risk at the individual level and protect the company from sophisticated, modern attacks that bypass traditional firewalls.

Occupational Cybersecurity in the Office: Awareness and Best Practices

What You Will Learn

Communicate securely across platforms and avoid bypassing security controls for convenience.

Protect sensitive corporate data by avoiding public Artificial Intelligence tools that retain data for training models.

Identify and defend against Business Email Compromise (BEC) attacks that use urgency and authority instead of malicious links.

Establish unique, 20-character passwords using an enterprise-approved Password Manager to combat automated credential stuffing.

Respond effectively to MFA Fatigue attacks by denying repeated approval requests and immediately reporting the incident.

Maintain strict network discipline in public spaces by utilizing corporate VPNs and cellular hotspots to avoid "Evil Twin" network traps.

Topics Covered

Training Features

Animated explainer videos demonstrating "Evil Twin" fake Wi-Fi access points.

Real-life scenarios of MFA Fatigue and Push Bombing techniques used by advanced hacking groups.

Interactive questions to practice "out-of-band" human verification for urgent wire transfer requests.

Knowledge checks on isolating vulnerable smart home devices using a dedicated Guest Network.

Final assessment to validate secure communication and identity defense habits.

Policy & Compliance relevance

Information Security Policy

Remote Work and Bring Your Own Device (BYOD) Policy

Data Loss Prevention (DLP) and Data Handling Guidelines

Generative AI Acceptable Use Policy

How this training reduces risk

  • Completing this CBT helps reduce human risk by improving awareness, strengthening secure behavior, and minimizing the likelihood of security incidents.
  • Prevents critical corporate data leaks caused by Shadow AI inputs and unauthorized email forwarding.
  • Thwarts automated credential stuffing attacks through strict, company-wide password manager adoption.
  • Part of continuous risk evaluation.

Tracking & Reporting

Training completion and assessment results are recorded for security monitoring, risk assessment, and compliance reporting.

  1. Duration: 15mins
  2. Level: Intermediate
  3. Category: Security Awareness
  4. Audience:All EmployeesRemote WorkersIT Staff

Defend your identity, secure your communication, and protect the modern perimeter.