Safety, trust and security are core to customer
retention, growth, and the long term
success of every company. While companies
must continually look for new ways to
increase efficiency and productivity, security
of accounts and sensitive customer
information is a top priority. For more info: www.nafcu.org/cyveillance
Why Teams call analytics are critical to your entire business
Cyber Safety Awareness Training (Brochure)
1. World Leader in
Cyber Intelligence™
Cyveillance Cyber Safety Awareness™ » Datasheet
Cyveillance Cyber Safety Awareness™
Keeping Abreast of Evolving Threats The courses consist of a three-part series
Safety, trust and security are core to cus- designed to be viewed either as a whole or
tomer retention, growth, and the long term as a security awareness training course pro-
success of every company. While compa- gram where each module progressively
nies must continually look for new ways to makes students aware of increasingly more
increase efficiency and productivity, securi- complex attacks. Focusing on specific areas
ty of accounts and sensitive customer of cyber safety, each course builds on the
information is a top priority. foundations established by the preceding
course. The courses are described below:
Everyone on the front lines of customer Robust Training and
service and delivery (not just IT personnel) Intro to Cyber Safety Management Tools
must have a solid grasp on the growing Using an “you are the target, you are the • Role management
number of online threats facing the organi- defense” approach to cyber safety this capabilities provide granular
zation. That means an emphasis on ongo- course covers the basic fundamentals of control of customer-branded
ing education, starting with cyber safety. cyber safety using real-world examples of portal
• Status, score and duration
today’s cyber threats combined with easy-
shown for each attendee
Training from a Leader in Cyber Security to-remember steps to protect users and
• History reports available for
The Cyveillance Cyber Safety Awareness™ the network.
all attendees
training modules give employees a behind-
• Ability to require testing to
the-scenes look at the latest technologies Malware and Advanced Social Engineering ensure comprehension of
and techniques powering today’s most Attacks course
devastating Internet scams -- fraud, net- Malware is well-known to pose many dan- • Customizable notifications
work breaches, identity theft, and loss of gers to both employees and organizations. including enrollment, drop,
customer data. The courses provide best What is lesser known is that most malware and utilization rates
practices on how to safely navigate the infections are delivered via socially-engi- • Administrative tools allow
Internet, increasing awareness and height- neered attacks. This course provides a look for the tracking of attendee
ening each employee’s sense of responsi- at the latest methods used by cyber crimi- activity
bility. nals to infect users and the network with
malware and how many of these infections Materials:
can be avoided through safe Internet As part of training, students will
browsing habits. receive:
• Course guide
• Cyber tips for home and work
• Cyber safety checklist
• Recommendations and links
to online tools