Settings
Language
Color Theme
Remote Working
Everyone enjoys the freedom that comes with having a remote workplace, but there's still the looming question. How can we remain secure while working remotely?
Is the following statement True or False:
Remote working is a type of flexible work arrangement where you do not need to work from an office.
Remote work, also called work from home, work from anywhere, telework, remote job, mobile work, and distance work, is an employment arrangement in which employees do not commute to a central place of work, such as an office building, warehouse, or retail store.
View Options Again
True
False
A secure remote workplace
Working remotely while ensuring you're not at an elevated risk of cyber threats can be a difficult challenge to overcome. To combat this, we recommend the following:
Choose a secure location
Protect your devices
Encrypt your traffic
Select a private, dedicated space in your home or remote workplace that is away from foot traffic and prying eyes. This could be a separate room, a private corner of a room or even just positioning your workstation in such a way that your back is to a wall.
Devices used for remote working need to be protected against both physical and internet-borne threats. Ensure you patch your systems regularly, keep your anti-virus up-to-date and where possible, keep separate devices for work and personal use.
Use a virtual private network (VPN) when connecting to the internet, especially if you're using public Wi-Fi networks or share your internet connection with others.
Which of the following is NOT a way to secure your remote workplace?
Using public Wi-Fi networks can expose our devices to cyber criminals who may try to intercept our traffic. To mitigate this, we can use a VPN to encrypt all network traffic from our device.
View Options Again
Use public Wi-Fi networks.
Choose a secure location.
Encrypt your traffic.
Protect your devices.
Remote Communication Best Practices
Use messaging services that offer end-to-end encryption. When video-conferencing, ensure all participants are authenticated. Use collaboration tools that provide a means to securely transfer files. Use consistent communication methods with colleagues.
Is the following statement True or False:
Wherever possible, we should use a consistent and secure method of communication with colleagues.
When working remotely, maintaining secure and consistent communication is that much more important. We become almost entirely dependent on communicating with colleagues through messaging, phone or video-conferencing services.
View Options Again
True
False
Work Travel Best Practices
Encrypt your internet connection with a VPN. Avoid using public Wi-Fi networks but if you do, avoid entering any sensitive information unless connected to a VPN. Finally, be aware of your surroundings, you may have a shoulder-surfer close-by!
Is the following statement True or False:
Using public Wi-Fi networks is ok, even if I don't encrypt my traffic with a VPN.
Using public Wi-Fi networks should only be a last resort. When we connect to these, we're exposing our devices to whoever else is on the network or controls it. Our traffic can potentially be intercepted, and our device could also be attacked if we don't have it patched. Always use a VPN when on public Wi-Fi networks.
View Options Again
True
False
Data Protection Best Practices
Using the local storage on our devices is tempting, but what if that device is stolen, lost, or otherwise inaccessible? To mitigate this, store work data on a work-approved network or cloud-accessible storage in the event we need to restore from it.
Mobile Device Best Practices
Mobile phones have become a critical part of the modern work environment. If they're hacked, it's often just as bad as your laptop or computer getting compromised! To mitigate this, we should:
Screen Lock
Patching Regularly
Data Backups
Make sure all your mobile devices have the screen lock feature turned on and that they require a strong password or PIN to gain entry. At a minimum, use Face ID or Touch ID to manage the unlocking process.
Our phones need to be patched just as often as our laptops and computers. Regardless of whether you're using Android or iOS, the respective vendors release security patches on a near-monthly basis. Don't forget to update your apps as well! They are often overlooked but may have security vulnerabilities that need fixing.
Phones often hold sensitive information that businesses need to function, however they are also often lost, stolen or damaged. To mitigate against this, wherever possible, backup your contacts and data to secure work-approved network or cloud storage. In your phone becomes inaccessible, you'll be able to recover quickly!
Which of the following is NOT a best practice for securing mobile devices?
Cyber criminals often abuse the app stores offered by Google and Apple to trick users into installing spyware and other forms of malicious software. Always apply critical thinking when downloading an app from the app store, and avoid installing apps from unknown software vendors. Using a screen lock, patching regularly, and setting up data backups
View Options Again
Patching regularly.
Using a screen lock.
Setting up data backups.
Installing unknown software from the app store.
Wrapping up
Remote working has seen a sudden surge in popularity over the past few years. We each need to do our part to ensure we can work remotely while remaining productive and secure. If you suspect something is off, always err on the side of caution!
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Remote-Working
[88, "Remote-Working", "Remote-Working"],
Remote Working
[89, "Remote Working", "Remote Working"],
Everyone enjoys the freedom that comes with having a remote workplace, but there's still the looming question. How can we remain secure while working remotely?
[90, "Everyone enjoys the freedom that comes with having a remote workplace, but there's still the looming question. How can we remain secure while working remotely?", "Everyone enjoys the freedom that comes with having a remote workplace, but there's still the looming question. How can we remain secure while working remotely?"],
Remote working is a type of flexible work arrangement where you do not need to work from an office.
[91, "Remote working is a type of flexible work arrangement where you do not need to work from an office.", "Remote working is a type of flexible work arrangement where you do not need to work from an office."],
Remote work, also called work from home, work from anywhere, telework, remote job, mobile work, and distance work, is an employment arrangement in which employees do not commute to a central place of work, such as an office building, warehouse, or retail store.
[92, "Remote work, also called work from home, work from anywhere, telework, remote job, mobile work, and distance work, is an employment arrangement in which employees do not commute to a central place of work, such as an office building, warehouse, or retail store.", "Remote work, also called work from home, work from anywhere, telework, remote job, mobile work, and distance work, is an employment arrangement in which employees do not commute to a central place of work, such as an office building, warehouse, or retail store."],
A secure remote workplace
[93, "A secure remote workplace", "A secure remote workplace"],
Working remotely while ensuring you're not at an elevated risk of cyber threats can be a difficult challenge to overcome. To combat this, we recommend the following:
[94, "Working remotely while ensuring you're not at an elevated risk of cyber threats can be a difficult challenge to overcome. To combat this, we recommend the following:", "Working remotely while ensuring you're not at an elevated risk of cyber threats can be a difficult challenge to overcome. To combat this, we recommend the following:"],
Choose a secure location
[95, "Choose a secure location", "Choose a secure location"],
Select a private, dedicated space in your home or remote workplace that is away from foot traffic and prying eyes. This could be a separate room, a private corner of a room or even just positioning your workstation in such a way that your back is to a wall.
[96, "Select a private, dedicated space in your home or remote workplace that is away from foot traffic and prying eyes. This could be a separate room, a private corner of a room or even just positioning your workstation in such a way that your back is to a wall.", "Select a private, dedicated space in your home or remote workplace that is away from foot traffic and prying eyes. This could be a separate room, a private corner of a room or even just positioning your workstation in such a way that your back is to a wall."],
Protect your devices
[97, "Protect your devices", "Protect your devices"],
Devices used for remote working need to be protected against both physical and internet-borne threats. Ensure you patch your systems regularly, keep your anti-virus up-to-date and where possible, keep separate devices for work and personal use.
[98, "Devices used for remote working need to be protected against both physical and internet-borne threats. Ensure you patch your systems regularly, keep your anti-virus up-to-date and where possible, keep separate devices for work and personal use.", "Devices used for remote working need to be protected against both physical and internet-borne threats. Ensure you patch your systems regularly, keep your anti-virus up-to-date and where possible, keep separate devices for work and personal use."],
Encrypt your traffic
[99, "Encrypt your traffic", "Encrypt your traffic"],
Use a virtual private network (VPN) when connecting to the internet, especially if you're using public Wi-Fi networks or share your internet connection with others.
[100, "Use a virtual private network (VPN) when connecting to the internet, especially if you're using public Wi-Fi networks or share your internet connection with others.", "Use a virtual private network (VPN) when connecting to the internet, especially if you're using public Wi-Fi networks or share your internet connection with others."],
Which of the following is NOT a way to secure your remote workplace?
[101, "Which of the following is NOT a way to secure your remote workplace?", "Which of the following is NOT a way to secure your remote workplace?"],
Encrypt your traffic.
[102, "Encrypt your traffic.", "Encrypt your traffic."],
Protect your devices.
[103, "Protect your devices.", "Protect your devices."],
Choose a secure location.
[104, "Choose a secure location.", "Choose a secure location."],
Use public Wi-Fi networks.
[105, "Use public Wi-Fi networks.", "Use public Wi-Fi networks."],
Using public Wi-Fi networks can expose our devices to cyber criminals who may try to intercept our traffic. To mitigate this, we can use a VPN to encrypt all network traffic from our device.
[106, "Using public Wi-Fi networks can expose our devices to cyber criminals who may try to intercept our traffic. To mitigate this, we can use a VPN to encrypt all network traffic from our device.", "Using public Wi-Fi networks can expose our devices to cyber criminals who may try to intercept our traffic. To mitigate this, we can use a VPN to encrypt all network traffic from our device."],
Remote Communication Best Practices
[107, "Remote Communication Best Practices", "Remote Communication Best Practices"],
Use messaging services that offer end-to-end encryption. When video-conferencing, ensure all participants are authenticated. Use collaboration tools that provide a means to securely transfer files. Use consistent communication methods with colleagues.
[108, "Use messaging services that offer end-to-end encryption. When video-conferencing, ensure all participants are authenticated. Use collaboration tools that provide a means to securely transfer files. Use consistent communication methods with colleagues.", "Use messaging services that offer end-to-end encryption. When video-conferencing, ensure all participants are authenticated. Use collaboration tools that provide a means to securely transfer files. Use consistent communication methods with colleagues."],
Wherever possible, we should use a consistent and secure method of communication with colleagues.
[109, "Wherever possible, we should use a consistent and secure method of communication with colleagues.", "Wherever possible, we should use a consistent and secure method of communication with colleagues."],
When working remotely, maintaining secure and consistent communication is that much more important. We become almost entirely dependent on communicating with colleagues through messaging, phone or video-conferencing services.
[110, "When working remotely, maintaining secure and consistent communication is that much more important. We become almost entirely dependent on communicating with colleagues through messaging, phone or video-conferencing services.", "When working remotely, maintaining secure and consistent communication is that much more important. We become almost entirely dependent on communicating with colleagues through messaging, phone or video-conferencing services."],
Work Travel Best Practices
[111, "Work Travel Best Practices", "Work Travel Best Practices"],
Encrypt your internet connection with a VPN. Avoid using public Wi-Fi networks but if you do, avoid entering any sensitive information unless connected to a VPN. Finally, be aware of your surroundings, you may have a shoulder-surfer close-by!
[112, "Encrypt your internet connection with a VPN. Avoid using public Wi-Fi networks but if you do, avoid entering any sensitive information unless connected to a VPN. Finally, be aware of your surroundings, you may have a shoulder-surfer close-by!", "Encrypt your internet connection with a VPN. Avoid using public Wi-Fi networks but if you do, avoid entering any sensitive information unless connected to a VPN. Finally, be aware of your surroundings, you may have a shoulder-surfer close-by!"],
Using public Wi-Fi networks is ok, even if I don't encrypt my traffic with a VPN.
[113, "Using public Wi-Fi networks is ok, even if I don't encrypt my traffic with a VPN.", "Using public Wi-Fi networks is ok, even if I don't encrypt my traffic with a VPN."],
Using public Wi-Fi networks should only be a last resort. When we connect to these, we're exposing our devices to whoever else is on the network or controls it. Our traffic can potentially be intercepted, and our device could also be attacked if we don't have it patched. Always use a VPN when on public Wi-Fi networks.
[114, "Using public Wi-Fi networks should only be a last resort. When we connect to these, we're exposing our devices to whoever else is on the network or controls it. Our traffic can potentially be intercepted, and our device could also be attacked if we don't have it patched. Always use a VPN when on public Wi-Fi networks.", "Using public Wi-Fi networks should only be a last resort. When we connect to these, we're exposing our devices to whoever else is on the network or controls it. Our traffic can potentially be intercepted, and our device could also be attacked if we don't have it patched. Always use a VPN when on public Wi-Fi networks."],
Data Protection Best Practices
[115, "Data Protection Best Practices", "Data Protection Best Practices"],
Using the local storage on our devices is tempting, but what if that device is stolen, lost, or otherwise inaccessible? To mitigate this, store work data on a work-approved network or cloud-accessible storage in the event we need to restore from it.
[116, "Using the local storage on our devices is tempting, but what if that device is stolen, lost, or otherwise inaccessible? To mitigate this, store work data on a work-approved network or cloud-accessible storage in the event we need to restore from it.", "Using the local storage on our devices is tempting, but what if that device is stolen, lost, or otherwise inaccessible? To mitigate this, store work data on a work-approved network or cloud-accessible storage in the event we need to restore from it."],
Mobile Device Best Practices
[117, "Mobile Device Best Practices", "Mobile Device Best Practices"],
Mobile phones have become a critical part of the modern work environment. If they're hacked, it's often just as bad as your laptop or computer getting compromised! To mitigate this, we should:
[118, "Mobile phones have become a critical part of the modern work environment. If they're hacked, it's often just as bad as your laptop or computer getting compromised! To mitigate this, we should:", "Mobile phones have become a critical part of the modern work environment. If they're hacked, it's often just as bad as your laptop or computer getting compromised! To mitigate this, we should:"],
Screen Lock
[119, "Screen Lock", "Screen Lock"],
Make sure all your mobile devices have the screen lock feature turned on and that they require a strong password or PIN to gain entry. At a minimum, use Face ID or Touch ID to manage the unlocking process.
[120, "Make sure all your mobile devices have the screen lock feature turned on and that they require a strong password or PIN to gain entry. At a minimum, use Face ID or Touch ID to manage the unlocking process.", "Make sure all your mobile devices have the screen lock feature turned on and that they require a strong password or PIN to gain entry. At a minimum, use Face ID or Touch ID to manage the unlocking process."],
Patching Regularly
[121, "Patching Regularly", "Patching Regularly"],
Our phones need to be patched just as often as our laptops and computers. Regardless of whether you're using Android or iOS, the respective vendors release security patches on a near-monthly basis. Don't forget to update your apps as well! They are often overlooked but may have security vulnerabilities that need fixing.
[122, "Our phones need to be patched just as often as our laptops and computers. Regardless of whether you're using Android or iOS, the respective vendors release security patches on a near-monthly basis. Don't forget to update your apps as well! They are often overlooked but may have security vulnerabilities that need fixing.", "Our phones need to be patched just as often as our laptops and computers. Regardless of whether you're using Android or iOS, the respective vendors release security patches on a near-monthly basis. Don't forget to update your apps as well! They are often overlooked but may have security vulnerabilities that need fixing."],
Data Backups
[123, "Data Backups", "Data Backups"],
Phones often hold sensitive information that businesses need to function, however they are also often lost, stolen or damaged. To mitigate against this, wherever possible, backup your contacts and data to secure work-approved network or cloud storage. In your phone becomes inaccessible, you'll be able to recover quickly!
[124, "Phones often hold sensitive information that businesses need to function, however they are also often lost, stolen or damaged. To mitigate against this, wherever possible, backup your contacts and data to secure work-approved network or cloud storage. In your phone becomes inaccessible, you'll be able to recover quickly!", "Phones often hold sensitive information that businesses need to function, however they are also often lost, stolen or damaged. To mitigate against this, wherever possible, backup your contacts and data to secure work-approved network or cloud storage. In your phone becomes inaccessible, you'll be able to recover quickly!"],
Which of the following is NOT a best practice for securing mobile devices?
[125, "Which of the following is NOT a best practice for securing mobile devices?", "Which of the following is NOT a best practice for securing mobile devices?"],
Using a screen lock.
[126, "Using a screen lock.", "Using a screen lock."],
Patching regularly.
[127, "Patching regularly.", "Patching regularly."],
Setting up data backups.
[128, "Setting up data backups.", "Setting up data backups."],
Installing unknown software from the app store.
[129, "Installing unknown software from the app store.", "Installing unknown software from the app store."],
Cyber criminals often abuse the app stores offered by Google and Apple to trick users into installing spyware and other forms of malicious software. Always apply critical thinking when downloading an app from the app store, and avoid installing apps from unknown software vendors. Using a screen lock, patching regularly, and setting up data backups
[130, "Cyber criminals often abuse the app stores offered by Google and Apple to trick users into installing spyware and other forms of malicious software. Always apply critical thinking when downloading an app from the app store, and avoid installing apps from unknown software vendors. Using a screen lock, patching regularly, and setting up data backups ", "Cyber criminals often abuse the app stores offered by Google and Apple to trick users into installing spyware and other forms of malicious software. Always apply critical thinking when downloading an app from the app store, and avoid installing apps from unknown software vendors. Using a screen lock, patching regularly, and setting up data backups "],
Wrapping up
[131, "Wrapping up", "Wrapping up"],
Remote working has seen a sudden surge in popularity over the past few years. We each need to do our part to ensure we can work remotely while remaining productive and secure. If you suspect something is off, always err on the side of caution!
[132, "Remote working has seen a sudden surge in popularity over the past few years. We each need to do our part to ensure we can work remotely while remaining productive and secure. If you suspect something is off, always err on the side of caution!", "Remote working has seen a sudden surge in popularity over the past few years. We each need to do our part to ensure we can work remotely while remaining productive and secure. If you suspect something is off, always err on the side of caution!"],
[133, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.