Hacking on social media

Watch the video from our Hacking on Social Media course, where Ralph realises that something isn’t right when his friend Kristen messages him with a link.

You can access the entire course on our e-learning platform by logging in here. If you do not have an account, you can try it for free.

Der Kurs

Über den Kurs

Sometimes, cybercriminals will hack into our friends’ or colleagues’ social media accounts and target those in their network. In this course, you will learn how to spot these attacks and how to protect your own social media accounts from being hacked.

Safe surfing

Summary for blog

Because we use the internet so extensively at work, it means that hackers and cybercriminals could be a threat to all organisations. Knowing how to stay safe is vital, both during private use and for work. In this blog, we discuss how blindly browsing can lead to mishaps from GDPR violations to malware. We also give some real-life examples on what to be aware of when browsing the internet.

Summary for blog

Because we use the internet so extensively at work, it means that hackers and cybercriminals could be a threat to all organisations. Knowing how to stay safe is vital, both during private use and for work. In this blog, we discuss how blindly browsing can lead to mishaps from GDPR violations to malware. We also give some real-life examples on what to be aware of when browsing the internet.

Safe surfing

Other material

To ensure that everyone is on the same page about how to protect their social media accounts, we have created some posters that you can download for free.

social media posters

Related courses

Phone Scamming
Kategorie: Cybersicherheit

Phone Scamming

Learning objectives: how phone scams work, which red flags you should be aware of, and how to best handle unexpected phone calls.

Weiterlesen "
Top

Contact us

You are always welcome to contact us
for an initial and informal chat about your cyber security challenges.

Kontaktiere uns

Sie können uns jederzeit kontaktieren, um ein erstes und informelles Gespräch über Ihre Herausforderungen im Bereich der Cybersicherheit zu führen.