Helping you create a cyber-secure workplace is our number one priority at PhishLine. With this in mind, we are pleased to offer the following content you can use to further your education, training and information security goals.
Developed for today’s time-pressed viewers, these engaging and informative videos cover the basics and more—all in about the time it takes to power up a computer. Click a thumbnail to view.
Click Thinking Content
One click on a malicious link is all it takes to unleash the worst the internet has to offer. Click Thinking content encourages users to think before they act, providing helpful examples and insights that make training and learning fun. It also covers a wide range of information security topics relevant to today’s security-aware companies.
LATEST CLICK THINKING BUNDLE: PUBLIC WIFI
A look at the risks of using public wifi and ways to protect yourself.
BRING YOUR OWN DEVICE
[RELEASED AUGUST 2018]
Examines risks to using one device for both personal and business purposes.
[RELEASED JULY 2018]
Tips to protect you and your company when networking professionally.
[RELEASED JUNE 2018]
Explores the dangers of downloading apps from the internet.
VISHING AND SMISHING
[RELEASED MAY 2018]
A closer look at the practices of voice phishing (Vishing) and text phishing (SMiShing) with an emphasis on protecting business.
PERSONAL AND PHYSICAL SECURITY
[RELEASED APRIL 2018]
We focus on personal and physical security concepts using fun personas to identify the types of tactics cybercriminals use to gain access to secure areas.
TRAVEL AND OUT OF OFFICE
[RELEASED MARCH 2018]
An in-depth look at cybersecurity threats that can arise during business travel and ways to protect your data and company network while on the road.
BUSINESS EMAIL COMPROMISE
[RELEASED FEBRUARY 2018]
We examine how cybercriminals pull off business email compromise scams in an engaging and stylish comic-style format.
PERSONALLY IDENTIFIABLE INFORMATION
[RELEASED JANUARY 2018]
A look at what qualifies as personally identifiable information (PII) and how cybercriminals use it to commit crimes like identify theft.