Settings
Language
Color Theme
Cybersecurity for sales professionals
Sales moves fast. Leads arrive daily, deals shift quickly, and timing matters. Cybercriminals understand this environment. They rely on speed, pressure, and familiarity to steal customer data, payments, and ruin sales.
Why sales professionals are targeted
Sales sits at the intersection of relationships, revenue, and systems. That combination makes sales professionals attractive to cybercriminals.
You handle valuable customer data
Pricing, proposals, contracts, contact details, and deal notes often live in your inbox and CRM. A compromised account can expose customers and sales strategy.
Trust is part of the job
Sales depends on relationships and two-way trust. Cybercriminals will commonly impersonate prospects, customers, or internal leaders to take advantage of that trust.
Urgency feels normal
Targets and deadlines mean urgent requests are common. Attackers hide inside that urgency to push fast decisions.
Is the following statement True or False:
Sales roles are rarely targeted because they do not handle sensitive information.
Loading...
View Options Again
True
False
Why do cybercriminals see sales teams as high-value targets?
Loading...
View Options Again
Sales teams rarely use digital tools
Sales teams do not interact with external contacts
Sales teams control access to deals, customer data, and revenue-related systems
Sales accounts cannot impact the organization
How cyberattacks typically begin
Most cyberattacks aimed at sales look like normal business activity. They appear as new leads, documents that require signing, pricing updates, or urgent deal requests.
Spear phishing uses deal context
Cybercriminals may reference real customer names, product details, or live opportunities to make phishing messages feel routine and believable.
Impersonation exploits trust
Fraudsters may pretend to be a manager or customer pushing you to rush and click a link or open a document.
Malicious files look professional
Attachments posing as proposals or contracts may install software or link to fake login pages that capture credentials.
Which is a strong red flag in a sales-related phishing message?
Loading...
View Options Again
A scheduled demo invite from your calendar tool
A follow-up email after a recent call
A new prospect sending you request to log in through an unfamiliar link
A prospect asking about product features
Balancing speed and sound judgment
Top sales professionals move quickly, but not blindly. Small verification habits protect deals without slowing momentum.
Pause when urgency meets risk
If urgency is paired with a request to click, download, install, or log in, take a brief moment to review the request before acting. If you're ever unsure, work with your IT to validate the request.
Verify high-impact changes
Refund requests, contract revisions, or account changes should be confirmed using a known and trusted contact method.
Use known and trusted links
Access CRM, e-signature, and document management platforms through bookmarked or trusted links rather than links inside emails.
Is the following statement True or False:
Good cybersecurity sometimes means slowing down or taking a moment to validate a request.
Loading...
View Options Again
True
False
A prospect asks you to download and agree to their internal Privacy Policy, but the file is named "privacy-policy.msi". What should you do?
Loading...
View Options Again
Download and install it to keep the deal moving
Pause and verify the request using a trusted contact or approved channel
Open it to see what it contains
Ignore it and move to another opportunity
Protecting CRM and customer data
Your CRM is a high-value target. It contains customer contact details, customer communications, sales strategy, and deal history. If cybercriminals gain access, they can impersonate you and target customers directly.
Secure your accounts
Use strong, unique passwords and multi-factor authentication for all work-related systems.
Store only what you need
Avoid hoarding unnecessary information. Only keep the bare minimum of what's necessary to to perform your role. Excess data increases damages if an account is compromised.
Which is the best practice when handling customer data?
Loading...
View Options Again
Use the same password across platforms
Store as much detail as possible for future use
Limit stored data to what is necessary for your role
Share login credentials to improve team speed
Social engineering beyond email
Not every attack arrives through your email inbox. Social media, messaging apps, and phone calls are often used to build credibility and apply pressure.
Social media impersonation
Fake LinkedIn profiles may reference real deals or mutual contacts to gain trust before sending malicious links or files.
Voice-based pressure
Phone calls can create urgency or authority, pushing you toward unsafe actions or rushed approvals.
Is the following statement True or False:
If a prospect reaches out through a professional networking site, it is safe to trust the files they share.
Loading...
View Options Again
True
False
Handling security questionnaires safely
Security questionnaires are common in sales. Cybercriminals exploit this by sending urgent links that lead to fake login pages designed to capture credentials. Remain wary of any security questionnaire that asks you to provide a password and ask the IT team for clarification if ever unsure.
A customer asks you to urgently fill out their vendor security questionnaire, but the link leads to an unexpected login page. What should you do?
Loading...
View Options Again
Report the request to the IT team and ask for clarification
Tell the customer to hurry up and buy your product
Ignore the request until they follow up
Sign in immediately to avoid slowing the deal
Security protects your pipeline
Cybersecurity in sales is not about slowing performance. It protects revenue, relationships, and reputation. Careful verification prevents avoidable losses and keeps deals moving forward.
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Language translation for this training module has been disabled and explicitly set to the following language
[88, "Language translation for this training module has been disabled and explicitly set to the following language", "Language translation for this training module has been disabled and explicitly set to the following language"],
I acknowledge
[89, "I acknowledge", "I acknowledge"],
Thank you for providing an acknowledgement
[90, "Thank you for providing an acknowledgement", "Thank you for providing an acknowledgement"],
Cybersecurity-For-Sales
[91, "Cybersecurity-For-Sales", "Cybersecurity-For-Sales"],
Cybersecurity for sales professionals
[92, "Cybersecurity for sales professionals ", "Cybersecurity for sales professionals "],
Sales moves fast. Leads arrive daily, deals shift quickly, and timing matters. Cybercriminals understand this environment. They rely on speed, pressure, and familiarity to steal customer data, payments, and ruin sales.
[93, "Sales moves fast. Leads arrive daily, deals shift quickly, and timing matters. Cybercriminals understand this environment. They rely on speed, pressure, and familiarity to steal customer data, payments, and ruin sales.", "Sales moves fast. Leads arrive daily, deals shift quickly, and timing matters. Cybercriminals understand this environment. They rely on speed, pressure, and familiarity to steal customer data, payments, and ruin sales."],
Why sales professionals are targeted
[94, "Why sales professionals are targeted", "Why sales professionals are targeted"],
Sales sits at the intersection of relationships, revenue, and systems. That combination makes sales professionals attractive to cybercriminals.
[95, "Sales sits at the intersection of relationships, revenue, and systems. That combination makes sales professionals attractive to cybercriminals.", "Sales sits at the intersection of relationships, revenue, and systems. That combination makes sales professionals attractive to cybercriminals."],
You handle valuable customer data
[96, "You handle valuable customer data", "You handle valuable customer data"],
Pricing, proposals, contracts, contact details, and deal notes often live in your inbox and CRM. A compromised account can expose customers and sales strategy.
[97, "Pricing, proposals, contracts, contact details, and deal notes often live in your inbox and CRM. A compromised account can expose customers and sales strategy.", "Pricing, proposals, contracts, contact details, and deal notes often live in your inbox and CRM. A compromised account can expose customers and sales strategy."],
Trust is part of the job
[98, "Trust is part of the job ", "Trust is part of the job "],
Sales depends on relationships and two-way trust. Cybercriminals will commonly impersonate prospects, customers, or internal leaders to take advantage of that trust.
[99, "Sales depends on relationships and two-way trust. Cybercriminals will commonly impersonate prospects, customers, or internal leaders to take advantage of that trust. ", "Sales depends on relationships and two-way trust. Cybercriminals will commonly impersonate prospects, customers, or internal leaders to take advantage of that trust. "],
Urgency feels normal
[100, "Urgency feels normal", "Urgency feels normal"],
Targets and deadlines mean urgent requests are common. Attackers hide inside that urgency to push fast decisions.
[101, "Targets and deadlines mean urgent requests are common. Attackers hide inside that urgency to push fast decisions.", "Targets and deadlines mean urgent requests are common. Attackers hide inside that urgency to push fast decisions."],
Sales roles are rarely targeted because they do not handle sensitive information.
[102, "Sales roles are rarely targeted because they do not handle sensitive information.", "Sales roles are rarely targeted because they do not handle sensitive information."],
Sales teams manage customer data, contracts, pricing, and core systems like email and CRM platforms. That makes them valuable targets.
[103, "Sales teams manage customer data, contracts, pricing, and core systems like email and CRM platforms. That makes them valuable targets.", "Sales teams manage customer data, contracts, pricing, and core systems like email and CRM platforms. That makes them valuable targets."],
Why do cybercriminals see sales teams as high-value targets?
[104, "Why do cybercriminals see sales teams as high-value targets?", "Why do cybercriminals see sales teams as high-value targets?"],
Sales teams control access to deals, customer data, and revenue-related systems
[105, "Sales teams control access to deals, customer data, and revenue-related systems", "Sales teams control access to deals, customer data, and revenue-related systems"],
Sales teams rarely use digital tools
[106, "Sales teams rarely use digital tools", "Sales teams rarely use digital tools"],
Sales teams do not interact with external contacts
[107, "Sales teams do not interact with external contacts", "Sales teams do not interact with external contacts"],
Sales accounts cannot impact the organization
[108, "Sales accounts cannot impact the organization", "Sales accounts cannot impact the organization"],
Sales accounts connect people, money, and systems. If compromised, attackers can reach customers, internal teams, and sensitive data.
[109, "Sales accounts connect people, money, and systems. If compromised, attackers can reach customers, internal teams, and sensitive data.", "Sales accounts connect people, money, and systems. If compromised, attackers can reach customers, internal teams, and sensitive data."],
How cyberattacks typically begin
[110, "How cyberattacks typically begin", "How cyberattacks typically begin"],
Most cyberattacks aimed at sales look like normal business activity. They appear as new leads, documents that require signing, pricing updates, or urgent deal requests.
[111, "Most cyberattacks aimed at sales look like normal business activity. They appear as new leads, documents that require signing, pricing updates, or urgent deal requests.", "Most cyberattacks aimed at sales look like normal business activity. They appear as new leads, documents that require signing, pricing updates, or urgent deal requests."],
Spear phishing uses deal context
[112, "Spear phishing uses deal context", "Spear phishing uses deal context"],
Cybercriminals may reference real customer names, product details, or live opportunities to make phishing messages feel routine and believable.
[113, "Cybercriminals may reference real customer names, product details, or live opportunities to make phishing messages feel routine and believable.", "Cybercriminals may reference real customer names, product details, or live opportunities to make phishing messages feel routine and believable."],
Impersonation exploits trust
[114, "Impersonation exploits trust", "Impersonation exploits trust"],
Fraudsters may pretend to be a manager or customer pushing you to rush and click a link or open a document.
[115, "Fraudsters may pretend to be a manager or customer pushing you to rush and click a link or open a document.", "Fraudsters may pretend to be a manager or customer pushing you to rush and click a link or open a document."],
Malicious files look professional
[116, "Malicious files look professional", "Malicious files look professional"],
Attachments posing as proposals or contracts may install software or link to fake login pages that capture credentials.
[117, "Attachments posing as proposals or contracts may install software or link to fake login pages that capture credentials.", "Attachments posing as proposals or contracts may install software or link to fake login pages that capture credentials."],
Which is a strong red flag in a sales-related phishing message?
[118, "Which is a strong red flag in a sales-related phishing message?", "Which is a strong red flag in a sales-related phishing message?"],
A new prospect sending you request to log in through an unfamiliar link
[119, "A new prospect sending you request to log in through an unfamiliar link", "A new prospect sending you request to log in through an unfamiliar link"],
A prospect asking about product features
[120, "A prospect asking about product features", "A prospect asking about product features"],
A scheduled demo invite from your calendar tool
[121, "A scheduled demo invite from your calendar tool", "A scheduled demo invite from your calendar tool"],
A follow-up email after a recent call
[122, "A follow-up email after a recent call", "A follow-up email after a recent call"],
Unexpected login requests are a common way to steal credentials. If a link in an unexpected email is asking you to log in to a known website, don't use the link; instead, use a bookmarked link or a known, trusted URL.
[123, "Unexpected login requests are a common way to steal credentials. If a link in an unexpected email is asking you to log in to a known website, don't use the link; instead, use a bookmarked link or a known, trusted URL.", "Unexpected login requests are a common way to steal credentials. If a link in an unexpected email is asking you to log in to a known website, don't use the link; instead, use a bookmarked link or a known, trusted URL."],
Balancing speed and sound judgment
[124, "Balancing speed and sound judgment", "Balancing speed and sound judgment"],
Top sales professionals move quickly, but not blindly. Small verification habits protect deals without slowing momentum.
[125, "Top sales professionals move quickly, but not blindly. Small verification habits protect deals without slowing momentum.", "Top sales professionals move quickly, but not blindly. Small verification habits protect deals without slowing momentum."],
Pause when urgency meets risk
[126, "Pause when urgency meets risk", "Pause when urgency meets risk"],
If urgency is paired with a request to click, download, install, or log in, take a brief moment to review the request before acting. If you're ever unsure, work with your IT to validate the request.
[127, "If urgency is paired with a request to click, download, install, or log in, take a brief moment to review the request before acting. If you're ever unsure, work with your IT to validate the request.", "If urgency is paired with a request to click, download, install, or log in, take a brief moment to review the request before acting. If you're ever unsure, work with your IT to validate the request."],
Verify high-impact changes
[128, "Verify high-impact changes", "Verify high-impact changes"],
Refund requests, contract revisions, or account changes should be confirmed using a known and trusted contact method.
[129, "Refund requests, contract revisions, or account changes should be confirmed using a known and trusted contact method.", "Refund requests, contract revisions, or account changes should be confirmed using a known and trusted contact method."],
Use known and trusted links
[130, "Use known and trusted links", "Use known and trusted links"],
Access CRM, e-signature, and document management platforms through bookmarked or trusted links rather than links inside emails.
[131, "Access CRM, e-signature, and document management platforms through bookmarked or trusted links rather than links inside emails.", "Access CRM, e-signature, and document management platforms through bookmarked or trusted links rather than links inside emails."],
Good cybersecurity sometimes means slowing down or taking a moment to validate a request.
[132, "Good cybersecurity sometimes means slowing down or taking a moment to validate a request.", "Good cybersecurity sometimes means slowing down or taking a moment to validate a request."],
A short pause to verify legitimacy can prevent cyber incidents.
[133, "A short pause to verify legitimacy can prevent cyber incidents.", "A short pause to verify legitimacy can prevent cyber incidents."],
A prospect asks you to download and agree to their internal Privacy Policy, but the file is named "privacy-policy.msi". What should you do?
[134, "A prospect asks you to download and agree to their internal Privacy Policy, but the file is named "privacy-policy.msi". What should you do?", "A prospect asks you to download and agree to their internal Privacy Policy, but the file is named "privacy-policy.msi". What should you do?"],
Download and install it to keep the deal moving
[135, "Download and install it to keep the deal moving", "Download and install it to keep the deal moving"],
Open it to see what it contains
[136, "Open it to see what it contains", "Open it to see what it contains"],
Pause and verify the request using a trusted contact or approved channel
[137, "Pause and verify the request using a trusted contact or approved channel", "Pause and verify the request using a trusted contact or approved channel"],
Ignore it and move to another opportunity
[138, "Ignore it and move to another opportunity", "Ignore it and move to another opportunity"],
Files ending in .msi install software, not documents. A real policy should be readable as a PDF (.pdf file extension).
[139, "Files ending in .msi install software, not documents. A real policy should be readable as a PDF (.pdf file extension).", "Files ending in .msi install software, not documents. A real policy should be readable as a PDF (.pdf file extension)."],
Protecting CRM and customer data
[140, "Protecting CRM and customer data ", "Protecting CRM and customer data "],
Your CRM is a high-value target. It contains customer contact details, customer communications, sales strategy, and deal history. If cybercriminals gain access, they can impersonate you and target customers directly.
[141, "Your CRM is a high-value target. It contains customer contact details, customer communications, sales strategy, and deal history. If cybercriminals gain access, they can impersonate you and target customers directly.", "Your CRM is a high-value target. It contains customer contact details, customer communications, sales strategy, and deal history. If cybercriminals gain access, they can impersonate you and target customers directly."],
Secure your accounts
[142, "Secure your accounts", "Secure your accounts"],
Use strong, unique passwords and multi-factor authentication for all work-related systems.
[143, "Use strong, unique passwords and multi-factor authentication for all work-related systems.", "Use strong, unique passwords and multi-factor authentication for all work-related systems."],
Store only what you need
[144, "Store only what you need", "Store only what you need"],
Avoid hoarding unnecessary information. Only keep the bare minimum of what's necessary to to perform your role. Excess data increases damages if an account is compromised.
[145, "Avoid hoarding unnecessary information. Only keep the bare minimum of what's necessary to to perform your role. Excess data increases damages if an account is compromised.", "Avoid hoarding unnecessary information. Only keep the bare minimum of what's necessary to to perform your role. Excess data increases damages if an account is compromised."],
Which is the best practice when handling customer data?
[146, "Which is the best practice when handling customer data? ", "Which is the best practice when handling customer data? "],
Store as much detail as possible for future use
[147, "Store as much detail as possible for future use", "Store as much detail as possible for future use"],
Share login credentials to improve team speed
[148, "Share login credentials to improve team speed", "Share login credentials to improve team speed"],
Limit stored data to what is necessary for your role
[149, "Limit stored data to what is necessary for your role", "Limit stored data to what is necessary for your role"],
Use the same password across platforms
[150, "Use the same password across platforms", "Use the same password across platforms"],
Limiting stored data helps to minimize the impact of a potential account compromise.
[151, "Limiting stored data helps to minimize the impact of a potential account compromise.", "Limiting stored data helps to minimize the impact of a potential account compromise."],
Social engineering beyond email
[152, "Social engineering beyond email", "Social engineering beyond email"],
Not every attack arrives through your email inbox. Social media, messaging apps, and phone calls are often used to build credibility and apply pressure.
[153, "Not every attack arrives through your email inbox. Social media, messaging apps, and phone calls are often used to build credibility and apply pressure.", "Not every attack arrives through your email inbox. Social media, messaging apps, and phone calls are often used to build credibility and apply pressure."],
Social media impersonation
[154, "Social media impersonation", "Social media impersonation"],
Fake LinkedIn profiles may reference real deals or mutual contacts to gain trust before sending malicious links or files.
[155, "Fake LinkedIn profiles may reference real deals or mutual contacts to gain trust before sending malicious links or files.", "Fake LinkedIn profiles may reference real deals or mutual contacts to gain trust before sending malicious links or files."],
Voice-based pressure
[156, "Voice-based pressure", "Voice-based pressure"],
Phone calls can create urgency or authority, pushing you toward unsafe actions or rushed approvals.
[157, "Phone calls can create urgency or authority, pushing you toward unsafe actions or rushed approvals.", "Phone calls can create urgency or authority, pushing you toward unsafe actions or rushed approvals."],
If a prospect reaches out through a professional networking site, it is safe to trust the files they share.
[158, "If a prospect reaches out through a professional networking site, it is safe to trust the files they share.", "If a prospect reaches out through a professional networking site, it is safe to trust the files they share."],
Social media and professional networking profiles can be fake or compromised. Treat unexpected files and links with caution, regardless of platform.
[159, "Social media and professional networking profiles can be fake or compromised. Treat unexpected files and links with caution, regardless of platform. ", "Social media and professional networking profiles can be fake or compromised. Treat unexpected files and links with caution, regardless of platform. "],
Handling security questionnaires safely
[160, "Handling security questionnaires safely ", "Handling security questionnaires safely "],
Security questionnaires are common in sales. Cybercriminals exploit this by sending urgent links that lead to fake login pages designed to capture credentials. Remain wary of any security questionnaire that asks you to provide a password and ask the IT team for clarification if ever unsure.
[161, "Security questionnaires are common in sales. Cybercriminals exploit this by sending urgent links that lead to fake login pages designed to capture credentials. Remain wary of any security questionnaire that asks you to provide a password and ask the IT team for clarification if ever unsure.", "Security questionnaires are common in sales. Cybercriminals exploit this by sending urgent links that lead to fake login pages designed to capture credentials. Remain wary of any security questionnaire that asks you to provide a password and ask the IT team for clarification if ever unsure."],
A customer asks you to urgently fill out their vendor security questionnaire, but the link leads to an unexpected login page. What should you do?
[162, "A customer asks you to urgently fill out their vendor security questionnaire, but the link leads to an unexpected login page. What should you do?", "A customer asks you to urgently fill out their vendor security questionnaire, but the link leads to an unexpected login page. What should you do?"],
Sign in immediately to avoid slowing the deal
[163, "Sign in immediately to avoid slowing the deal", "Sign in immediately to avoid slowing the deal"],
Report the request to the IT team and ask for clarification
[164, "Report the request to the IT team and ask for clarification", "Report the request to the IT team and ask for clarification"],
Tell the customer to hurry up and buy your product
[165, "Tell the customer to hurry up and buy your product", "Tell the customer to hurry up and buy your product"],
Ignore the request until they follow up
[166, "Ignore the request until they follow up", "Ignore the request until they follow up"],
If a vendor security questionnaire leads you to an unexpected login page, you should always ask the IT team for clarification on what action to take next.
[167, "If a vendor security questionnaire leads you to an unexpected login page, you should always ask the IT team for clarification on what action to take next.", "If a vendor security questionnaire leads you to an unexpected login page, you should always ask the IT team for clarification on what action to take next."],
Security protects your pipeline
[168, "Security protects your pipeline", "Security protects your pipeline"],
Cybersecurity in sales is not about slowing performance. It protects revenue, relationships, and reputation. Careful verification prevents avoidable losses and keeps deals moving forward.
[169, "Cybersecurity in sales is not about slowing performance. It protects revenue, relationships, and reputation. Careful verification prevents avoidable losses and keeps deals moving forward. ", "Cybersecurity in sales is not about slowing performance. It protects revenue, relationships, and reputation. Careful verification prevents avoidable losses and keeps deals moving forward. "],
[170, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.