Cybersecurity

Cybersecurity

Email Security Essentials

How to create strong, unique passwords

Benefits of password managers

How to activate and use 2FA (two-factor authentication)

Password & Authentication Security

How to recognize phishing and fake email

Simple ways to verify legitimacy

What to do if you think you’ve been targeted

Introduction to Cybersecurity

What cybersecurity is and why it matters

Basic rules for using devices and the internet safely

How to protect personal and work-related information

Scroll to top