User
Write something
Microsoft Teams Made Easy is happening in 11 days
Pinned
Welcome here (Read this first 😀)
Welcome to our Learn Online Security community. We are here to learn from each other and teach tools that will further protect each other both online and offline. You are one of the founding members of this community, and we applaud you for taking the following steps. As such, we have slashed the prices on all our courses in the classroom for you! How can you get the most out of this community? 1. Add a comment to this post and introduce yourself, and let us know a question that you have about your security. 2. Invite a friend :) Communities are more fun with friends, so invite one friend (or ten) to join you here. 3. Engage in conversations and understand that this is a place of learning, hearing new ideas, and focusing on personal security. Thanks for being so awesome, and I'm excited to meet you :)
Welcome here (Read this first 😀)
Pinned
Why do we care about Social Engineering Security?
One of the most significant aspects of any scam, hack, theft, or similar incident is social engineering. If we can train you to understand what it is, recognize it, and prevent it before it even begins, you can stop it before it causes harm. The question here is, what do you know about Social Engineering? If you have never heard about it, here is a quick video about it. We believe this is such a core to our understanding that we have created a course on it that you can grab in our classroom tab above.
Kids Privacy - How important is it?
I was watching a reel, which I will share, that discussed how companies intentionally collect and sell children's information gathered from apps. You can watch the reel here, but comment here what your thoughts are here :) https://www.facebook.com/share/r/1782Fn8FYC/
The problem with Out of Office Reply's
Our upcoming podcast is focused on the information that a thief can gather from your Out of Office Reply. One of the biggest targets with this information tends to be admin assistants, secretaries, or interns. The scammer learns that the boss is gone to a conference and then uses the information learned to pretend to be the boss and extract a financial reward. So, a couple of questions for this morning. 1. How much information do you think is in an out-of-office reply? 2. How do you think that information would be used against you? 3. Do you use an out-of-office reply?
The problem with Out of Office Reply's
Don't miss the attack
Most of the time we focus on the hack or scam or theft and forget that there is a bigger picture here. We have to see the attack as a process and not a simple event. There are preplanned, well thought out, processes. The earlier we can pick up on the process, the quicker we can thwart the attack.
Don't miss the attack
1-12 of 12
powered by
Learn Online Security
skool.com/learn-online-security-4898
Improve yourself by learning the exact scams & tricks used against you—inside our free self-improvement community.
Build your own community
Bring people together around your passion and get paid.
Powered by