Search Results
IT Security: Ransomware (Individual)
This course explores what ransomware is, how cyberthieves attack systems with ransomware, what IT Departments and employees can do to reduce the likelihood of ransomware attacks, and what IT...
Digital Transformation Demystified - Part 5: Preparing for Potential Challenges in Digital Transformation (MP4)
Challenges will likely arise during your bank’s digital transformation process. This final webinar of the series will address potential obstacles to progress, roadblocks or stumbling blocks for...
IT Security: Credential Stuffing (Individual)
This course explores credential stuffing. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into...
IT Security: Work Off-Site (Individual)
This course examines the IT security risks associated with remote work. Learn to keep your computer, devices and home network secure, use public networks safely, and recognize phishing and targeted...