Select Page

All-Employee Security Awareness Program

Course Content

Information Security Awareness
What is it? What are the risks? What are the consequences?

  • Introduction to Information Security
    02:30

What Is Phishing and How to Avoid the Bait
Learn how to spot a scam in this explainer video. Making sense of technology, one byte at a time.

What Is Encryption? The Lowdown on Symmetric and Asymmetric Encryption
Find out more about the importance of security, how to prevent data leaks, and the nuances between symmetric and asymmetric encryption techniques in the latest explainer video from iluli by Mike Lamb.

Credential Stuffing: The Dangers of Reusing Passwords Online
Increased awareness and internet security is a necessity for all of us in the war on cybercrime. Find out how to avoid credential stuffing in the latest explainer video from iluli by Mike Lamb.

Be Aware of Malware: The Importance of Patches and Anti-Virus Software
As a group, we call them malware – AKA “malicious software” – built to exploit chinks in the armour of our operating systems. From clogging up your computer with pop-up ads to holding you to ransom by encrypting your files, it’s imperative that computers are kept up-to-date with the latest patches and anti-virus software. Discover three simple ways you can protect yourself and your computer in the latest explainer video from iluli by Mike Lamb.

Man-in-the-Middle Attacks: The importance of HTTPS
Vigilance is key. Google displays “Not Secure” against a website URL, indicating that you may be at risk. Just a single non-HTTPS page can leave user data vulnerable. To protect yourself, the best option is to use a VPN – a Virtual Private Network – which acts as a direct tunnel between you and the internet. Find out how to further improve your internet security in the latest explainer video from iluli by Mike Lamb.

A Guide to Digital Fingerprints
When we think about online tracking, we tend to think of Cookies, but there is arguably a larger threat to our privacy in the form of digital fingerprints – AKA, the Cookie-less Monster. Digital fingerprints don’t rely on Cookies at all. Instead, they are built from small amounts of information that browsers share from the websites you visit, quickly forming a profile that is easily identifiable as you. Whilst there are positive applications for digital fingerprints, such as combatting credential stuffing and fraud in general, it also leaves you vulnerable to unwanted targeted marketing. So, what can you do about it? From VPNs and Incognito Mode to disabling JavaScript, I explore the pros and cons of restricting where your digital fingerprint appears. Find out more in the latest video from iluli by Mike Lamb.