160171 – Promoting Information Security
Promoting Information Security emphasizes the importance of protecting personal and confidential information, and the best practices for doing so.
Employees will learn to identify what constitutes personal and confidential information, including employee, customer, and organizational data. Then employees are guided in protecting data in their personal conduct, including when handling data, disposing of data, and working with third parties. This course also presents information security best practices with regards to handling portable and electronic devices, managing passwords, and recognizing and addressing phishing attempts. Finally, the course covers how to recognize and respond to data security incidents and insider threats, the importance of prompt reporting in light of breach notification and disclosure requirements, and the protection from retaliation for reporting.
Arabic | Chinese Simplified | Dutch | English | French | French Canadian | German | Italian | Japanese | Korean | Brazilian Portuguese | Russian | Spanish Castilian | Spanish Latin American
Key Terms: accidental insiders | availability | business email compromise (BEC) | collecting | company assets | company devices | confidential information | confidentiality | cybersecurity | data minimization | data processing | data processors | data retention | data security | devices | disposal | disposing | electronic devices | equipment | handling | incidents | information security | insider threat awareness | insider threats | integrity | malicious insiders | malware | non-retaliation | password management | passwords | personal information (PI) | personally identifiable information (PII) | phishing | phishing attacks | portable devices | processing | public information | red flags | reporting | sensitive information | social engineering | storing | third parties