Settings
Language
Color Theme
Situational Awareness
Situational awareness in cybersecurity means having a clear understanding of potential threats, and vulnerabilities, with the ability to use this knowledge to make informed decisions.
Why is Situational Awareness important?
Cybersecurity situational awareness empowers everyone in the organization to protect their personal data, recognize and avoid common cyber threats, maintain safe online behavior, safeguard their devices, and contribute to a secure digital workplace.
What is an aspect of Situational Awareness?
Understanding potential threats, understanding your current security measures, and trusting your instincts help us make informed decisions to respond to cyber threats quickly and appropriately.
View Options Again
Understanding potential threats you face on a day-to-day basis.
Trusting your instincts and acting when you feel something is wrong.
All answers are aspects of situational awareness.
Having a clear understanding of current security measures.
Increase your Situational Awareness
As is true with most aspects of IT security, situational awareness is a team effort, and everybody is responsible for doing their part. Here are 3 ways you can improve your situational awareness.
Stay vigilant against phishing threats
Stay informed and share knowledge
Secure your physical assests
The most effective way to protect yourself from phishing attacks is with a security-first mindset. Always be skeptical of any unsolicited emails or messages until you can verify the legitimacy of the sender and the request itself. This is especially relevant for any email asking you to perform a sensitive task or implying urgent action is required.
Keep up to date with emerging trends in cybersecurity and constantly educate yourself. This will help equip you with the tools to detect and respond to potential risks effectively. Do your part by sharing knowledge with others in the organization and cultivating a strong security culture. Remember, we beat cyber threats together.
Always remember to secure your assets. This means using strong passwords on your devices, keeping them in a secure location when not in use, and making it a habit to lock your computer or device whenever it is unattended. This is a simple habit that can deter opportunistic threats.
What is a good habit you can adopt to secure your physical devices?
It's a simple but effective habit. Locking your device can deter opportunistic attackers from stealing information from your computer or performing actions under your accounts. It also deters mischievous colleagues from changing your wallpaper!
View Options Again
Ensuring you only open suspected phishing emails on your personal devices and not your work devices.
Sharing knowledge about the latest cyber breach with your co-workers.
Adopting least privileges principles.
Locking your devices when stepping away from them.
Is the following statement True or False:
In order to spot a phishing email, you need to be a cyber security expert.
While technical knowledge helps, situational awareness is equally powerful when it comes to detecting phishing. Remain alert and look for misspellings, grammatical errors, awkward phrasing, and threatening or urgent language. Ask yourself if this email is expected or if it seems too good to be true. If in doubt, report the email to your IT team.
View Options Again
True
False
Situational awareness allows organizations to detect threats faster.
Organizations with strong cybersecurity situational awareness are better equipped to detect and quickly recognize suspicious activity, minimizing the damage an attacker can inflict.
What is one benefit of having strong cybersecurity situational awareness for organizations?
When organizations can detect threats faster, they can take immediate action to prevent attackers from furthering their access. This could involve isolating compromised systems, blocking malicious activities, or initiating incident response procedures. This helps to reduce the risk of a data breach but doesn't eliminate it entirely.
View Options Again
It reduces the need for regular security updates and patches.
It enables organizations to detect and respond to threats faster.
It increases the likelihood of successful social engineering attacks.
It eliminates the risk of data breaches entirely.
Is the following statement True or False:
Situational awareness is about relying on your security team to detect cyber threats.
Security teams play a vital role in keeping you and your organization safe from cyber attacks, but it's not a complete solution. Situational awareness is a tool at everyone's disposal. It's made strong by educating yourself, staying informed about threats, using cyber security best practices like using strong passwords, and trusting your instincts.
View Options Again
True
False
Wrapping up
Having a high level of situational awareness means that you are equipped to detect the vast majority of attacks that cyber attackers send your way. Stay alert, stay aware, and stay one step ahead of the attackers!
Back
Next
Translation Correction
×
Select a translation to correct...
Begin the Guided Tour
[0, "Begin the Guided Tour", "Begin the Guided Tour"],
Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.
[1, "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.", "Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action."],
Compose
[2, "Compose", "Compose"],
Folders
[3, "Folders", "Folders"],
Inbox
[4, "Inbox", "Inbox"],
Starred
[5, "Starred", "Starred"],
Draft
[6, "Draft", "Draft"],
Sent Mail
[7, "Sent Mail", "Sent Mail"],
Spam
[8, "Spam", "Spam"],
Trash
[9, "Trash", "Trash"],
[URGENT] Claim Your Work From Home Set-Up Payment
[10, "[URGENT] Claim Your Work From Home Set-Up Payment", "[URGENT] Claim Your Work From Home Set-Up Payment"],
Human Resources
[11, "Human Resources", "Human Resources"],
to
[12, "to", "to"],
Claim Your Work From Home Set-Up Payment
[13, "Claim Your Work From Home Set-Up Payment", "Claim Your Work From Home Set-Up Payment"],
Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of
[14, "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of", "Our company acknowledges that we are all working from home for a longer period and is offering a one-time payment to all employees of"],
to ensure that you have a suitable home working set-up.
[15, "to ensure that you have a suitable home working set-up.", "to ensure that you have a suitable home working set-up."],
To receive the payment via payroll
[16, "To receive the payment via payroll", "To receive the payment via payroll"],
you will need to complete this
[17, "you will need to complete this", "you will need to complete this"],
acknowledgement form
[18, "acknowledgement form", "acknowledgement form"],
For more information on how to set up your home office space safely, please look at the
[19, "For more information on how to set up your home office space safely, please look at the", "For more information on how to set up your home office space safely, please look at the"],
Thank you
[20, "Thank you", "Thank you"],
The Human Resources Team
[21, "The Human Resources Team", "The Human Resources Team"],
This is an automatically generated email, please do not reply
[22, "This is an automatically generated email, please do not reply", "This is an automatically generated email, please do not reply"],
Is the following statement True or False
[23, "Is the following statement True or False", "Is the following statement True or False"],
View Options Again
[24, "View Options Again", "View Options Again"],
Email Subject: Urgent Action
[25, "Email Subject: Urgent Action", "Email Subject: Urgent Action"],
Phishing attacks are designed to put a
[26, "Phishing attacks are designed to put a", "Phishing attacks are designed to put a"],
time pressure on us to act fast
[27, "time pressure on us to act fast", "time pressure on us to act fast"],
This can cause us to skip much of the critical thinking we normally apply when browsing our emails
[28, "This can cause us to skip much of the critical thinking we normally apply when browsing our emails", "This can cause us to skip much of the critical thinking we normally apply when browsing our emails"],
Email Sender: Fradulent Address
[29, "Email Sender: Fradulent Address", "Email Sender: Fradulent Address"],
Email Sender: Fraudulent Address
[30, "Email Sender: Fraudulent Address", "Email Sender: Fraudulent Address"],
Attackers will often use
[31, "Attackers will often use", "Attackers will often use"],
obscure email addresses and use display names
[32, "obscure email addresses and use display names", "obscure email addresses and use display names"],
that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information
[33, "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information", "that appear legitimate to the naked eye. Be cautious and carefully inspect email sender information"],
Email Content: Engaging Topic
[34, "Email Content: Engaging Topic", "Email Content: Engaging Topic"],
Attackers often use a
[35, "Attackers often use a", "Attackers often use a"],
broad but important topic
[36, "broad but important topic", "broad but important topic"],
to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.
[37, "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes.", "to increase the likelihood of a victim interacting with the phishing material. These topics may include geographic, political or financial themes."],
Email Link: Phishing Website
[38, "Email Link: Phishing Website", "Email Link: Phishing Website"],
hovering over the link
[39, "hovering over the link", "hovering over the link"],
you'll see the true link location. Often this is enough to see the malicious intent.
[40, "you'll see the true link location. Often this is enough to see the malicious intent.", "you'll see the true link location. Often this is enough to see the malicious intent."],
Wrapping up
[41, "Wrapping up", "Wrapping up"],
If you
[42, "If you", "If you"],
spot anything suspicious
[43, "spot anything suspicious", "spot anything suspicious"],
with the email sender, subject, content, links or attachments
[44, "with the email sender, subject, content, links or attachments", "with the email sender, subject, content, links or attachments"],
Don't take the risk. Report the email to your IT or Security team for review.
[45, "Don't take the risk. Report the email to your IT or Security team for review.", "Don't take the risk. Report the email to your IT or Security team for review."],
Submit
[46, "Submit", "Submit"],
Next
[47, "Next", "Next"],
Back
[48, "Back", "Back"],
Malicious links will often appear with innocent looking text. By
[49, "Malicious links will often appear with innocent looking text. By", "Malicious links will often appear with innocent looking text. By"],
Correct!
[50, "Correct!", "Correct!"],
Incorrect
[51, "Incorrect", "Incorrect"],
True
[52, "True", "True"],
False
[53, "False", "False"],
Change language
[54, "Change language", "Change language"],
Current Language
[55, "Current Language", "Current Language"],
Use Browser Settings
[56, "Use Browser Settings", "Use Browser Settings"],
Select a language
[57, "Select a language", "Select a language"],
Change Language
[58, "Change Language", "Change Language"],
Please select a language
[59, "Please select a language", "Please select a language"],
Language
[60, "Language", "Language"],
Color Theme
[61, "Color Theme", "Color Theme"],
Color Theme And Background Selector
[62, "Color Theme And Background Selector", "Color Theme And Background Selector"],
Colorful Theme
[63, "Colorful Theme", "Colorful Theme"],
Select Theme
[64, "Select Theme", "Select Theme"],
Close
[65, "Close", "Close"],
Dark Theme
[66, "Dark Theme", "Dark Theme"],
Green Theme
[67, "Green Theme", "Green Theme"],
Purple Theme
[68, "Purple Theme", "Purple Theme"],
Light Theme
[69, "Light Theme", "Light Theme"],
Blue Theme
[70, "Blue Theme", "Blue Theme"],
Settings
[71, "Settings", "Settings"],
Theme Selected
[72, "Theme Selected", "Theme Selected"],
This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!
[73, "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!", "This training has been translated from English. If there is an inaccuracy, please report the correct translation by clicking here!"],
Translation Correction
[74, "Translation Correction", "Translation Correction"],
Select a translation to correct...
[75, "Select a translation to correct...", "Select a translation to correct..."],
Original Text
[76, "Original Text", "Original Text"],
Correct Translation
[77, "Correct Translation", "Correct Translation"],
Translation to correct...
[78, "Translation to correct...", "Translation to correct..."],
Submissions are reviewed and applied within 48 hours.
[79, "Submissions are reviewed and applied within 48 hours.", "Submissions are reviewed and applied within 48 hours."],
Submit Correction
[80, "Submit Correction", "Submit Correction"],
Submission Successfully Sent
[81, "Submission Successfully Sent", "Submission Successfully Sent"],
Submission Error - Please Try Again
[82, "Submission Error - Please Try Again", "Submission Error - Please Try Again"],
Submission Sending...
[83, "Submission Sending...", "Submission Sending..."],
Mandatory Viewing
[84, "Mandatory Viewing", "Mandatory Viewing"],
Please watch the video from beginning to end before proceeding.
[85, "Please watch the video from beginning to end before proceeding.", "Please watch the video from beginning to end before proceeding."],
Ok
[86, "Ok", "Ok"],
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.
[87, "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.", "Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant."],
Situational-Awareness
[88, "Situational-Awareness", "Situational-Awareness"],
Situational Awareness
[89, "Situational Awareness", "Situational Awareness"],
Situational awareness in cybersecurity means having a clear understanding of potential threats, and vulnerabilities, with the ability to use this knowledge to make informed decisions.
[90, "Situational awareness in cybersecurity means having a clear understanding of potential threats, and vulnerabilities, with the ability to use this knowledge to make informed decisions.", "Situational awareness in cybersecurity means having a clear understanding of potential threats, and vulnerabilities, with the ability to use this knowledge to make informed decisions."],
Why is Situational Awareness important?
[91, "Why is Situational Awareness important?", "Why is Situational Awareness important?"],
Cybersecurity situational awareness empowers everyone in the organization to protect their personal data, recognize and avoid common cyber threats, maintain safe online behavior, safeguard their devices, and contribute to a secure digital workplace.
[92, "Cybersecurity situational awareness empowers everyone in the organization to protect their personal data, recognize and avoid common cyber threats, maintain safe online behavior, safeguard their devices, and contribute to a secure digital workplace.", "Cybersecurity situational awareness empowers everyone in the organization to protect their personal data, recognize and avoid common cyber threats, maintain safe online behavior, safeguard their devices, and contribute to a secure digital workplace."],
What is an aspect of Situational Awareness?
[93, "What is an aspect of Situational Awareness?", "What is an aspect of Situational Awareness?"],
Understanding potential threats you face on a day-to-day basis.
[94, "Understanding potential threats you face on a day-to-day basis.", "Understanding potential threats you face on a day-to-day basis."],
Having a clear understanding of current security measures.
[95, "Having a clear understanding of current security measures.", "Having a clear understanding of current security measures."],
Trusting your instincts and acting when you feel something is wrong.
[96, "Trusting your instincts and acting when you feel something is wrong.", "Trusting your instincts and acting when you feel something is wrong."],
All answers are aspects of situational awareness.
[97, "All answers are aspects of situational awareness.", "All answers are aspects of situational awareness."],
Understanding potential threats, understanding your current security measures, and trusting your instincts help us make informed decisions to respond to cyber threats quickly and appropriately.
[98, "Understanding potential threats, understanding your current security measures, and trusting your instincts help us make informed decisions to respond to cyber threats quickly and appropriately. ", "Understanding potential threats, understanding your current security measures, and trusting your instincts help us make informed decisions to respond to cyber threats quickly and appropriately. "],
Increase your Situational Awareness
[99, "Increase your Situational Awareness", "Increase your Situational Awareness"],
As is true with most aspects of IT security, situational awareness is a team effort, and everybody is responsible for doing their part. Here are 3 ways you can improve your situational awareness.
[100, "As is true with most aspects of IT security, situational awareness is a team effort, and everybody is responsible for doing their part. Here are 3 ways you can improve your situational awareness.", "As is true with most aspects of IT security, situational awareness is a team effort, and everybody is responsible for doing their part. Here are 3 ways you can improve your situational awareness."],
Stay vigilant against phishing threats
[101, "Stay vigilant against phishing threats", "Stay vigilant against phishing threats"],
The most effective way to protect yourself from phishing attacks is with a security-first mindset. Always be skeptical of any unsolicited emails or messages until you can verify the legitimacy of the sender and the request itself. This is especially relevant for any email asking you to perform a sensitive task or implying urgent action is required.
[102, "The most effective way to protect yourself from phishing attacks is with a security-first mindset. Always be skeptical of any unsolicited emails or messages until you can verify the legitimacy of the sender and the request itself. This is especially relevant for any email asking you to perform a sensitive task or implying urgent action is required.", "The most effective way to protect yourself from phishing attacks is with a security-first mindset. Always be skeptical of any unsolicited emails or messages until you can verify the legitimacy of the sender and the request itself. This is especially relevant for any email asking you to perform a sensitive task or implying urgent action is required."],
Stay informed and share knowledge
[103, "Stay informed and share knowledge", "Stay informed and share knowledge"],
Keep up to date with emerging trends in cybersecurity and constantly educate yourself. This will help equip you with the tools to detect and respond to potential risks effectively. Do your part by sharing knowledge with others in the organization and cultivating a strong security culture. Remember, we beat cyber threats together.
[104, "Keep up to date with emerging trends in cybersecurity and constantly educate yourself. This will help equip you with the tools to detect and respond to potential risks effectively. Do your part by sharing knowledge with others in the organization and cultivating a strong security culture. Remember, we beat cyber threats together.", "Keep up to date with emerging trends in cybersecurity and constantly educate yourself. This will help equip you with the tools to detect and respond to potential risks effectively. Do your part by sharing knowledge with others in the organization and cultivating a strong security culture. Remember, we beat cyber threats together."],
Secure your physical assests
[105, "Secure your physical assests", "Secure your physical assests"],
Always remember to secure your assets. This means using strong passwords on your devices, keeping them in a secure location when not in use, and making it a habit to lock your computer or device whenever it is unattended. This is a simple habit that can deter opportunistic threats.
[106, "Always remember to secure your assets. This means using strong passwords on your devices, keeping them in a secure location when not in use, and making it a habit to lock your computer or device whenever it is unattended. This is a simple habit that can deter opportunistic threats.", "Always remember to secure your assets. This means using strong passwords on your devices, keeping them in a secure location when not in use, and making it a habit to lock your computer or device whenever it is unattended. This is a simple habit that can deter opportunistic threats."],
What is a good habit you can adopt to secure your physical devices?
[107, "What is a good habit you can adopt to secure your physical devices?", "What is a good habit you can adopt to secure your physical devices?"],
Ensuring you only open suspected phishing emails on your personal devices and not your work devices.
[108, "Ensuring you only open suspected phishing emails on your personal devices and not your work devices.", "Ensuring you only open suspected phishing emails on your personal devices and not your work devices."],
Locking your devices when stepping away from them.
[109, "Locking your devices when stepping away from them.", "Locking your devices when stepping away from them."],
Sharing knowledge about the latest cyber breach with your co-workers.
[110, "Sharing knowledge about the latest cyber breach with your co-workers.", "Sharing knowledge about the latest cyber breach with your co-workers."],
Adopting least privileges principles.
[111, "Adopting least privileges principles.", "Adopting least privileges principles."],
It's a simple but effective habit. Locking your device can deter opportunistic attackers from stealing information from your computer or performing actions under your accounts. It also deters mischievous colleagues from changing your wallpaper!
[112, "It's a simple but effective habit. Locking your device can deter opportunistic attackers from stealing information from your computer or performing actions under your accounts. It also deters mischievous colleagues from changing your wallpaper!", "It's a simple but effective habit. Locking your device can deter opportunistic attackers from stealing information from your computer or performing actions under your accounts. It also deters mischievous colleagues from changing your wallpaper!"],
In order to spot a phishing email, you need to be a cyber security expert.
[113, "In order to spot a phishing email, you need to be a cyber security expert.", "In order to spot a phishing email, you need to be a cyber security expert."],
While technical knowledge helps, situational awareness is equally powerful when it comes to detecting phishing. Remain alert and look for misspellings, grammatical errors, awkward phrasing, and threatening or urgent language. Ask yourself if this email is expected or if it seems too good to be true. If in doubt, report the email to your IT team.
[114, "While technical knowledge helps, situational awareness is equally powerful when it comes to detecting phishing. Remain alert and look for misspellings, grammatical errors, awkward phrasing, and threatening or urgent language. Ask yourself if this email is expected or if it seems too good to be true. If in doubt, report the email to your IT team.", "While technical knowledge helps, situational awareness is equally powerful when it comes to detecting phishing. Remain alert and look for misspellings, grammatical errors, awkward phrasing, and threatening or urgent language. Ask yourself if this email is expected or if it seems too good to be true. If in doubt, report the email to your IT team."],
Situational awareness allows organizations to detect threats faster.
[115, "Situational awareness allows organizations to detect threats faster.", "Situational awareness allows organizations to detect threats faster."],
Organizations with strong cybersecurity situational awareness are better equipped to detect and quickly recognize suspicious activity, minimizing the damage an attacker can inflict.
[116, "Organizations with strong cybersecurity situational awareness are better equipped to detect and quickly recognize suspicious activity, minimizing the damage an attacker can inflict.", "Organizations with strong cybersecurity situational awareness are better equipped to detect and quickly recognize suspicious activity, minimizing the damage an attacker can inflict."],
What is one benefit of having strong cybersecurity situational awareness for organizations?
[117, "What is one benefit of having strong cybersecurity situational awareness for organizations?", "What is one benefit of having strong cybersecurity situational awareness for organizations?"],
It increases the likelihood of successful social engineering attacks.
[118, "It increases the likelihood of successful social engineering attacks.", "It increases the likelihood of successful social engineering attacks."],
It reduces the need for regular security updates and patches.
[119, "It reduces the need for regular security updates and patches.", "It reduces the need for regular security updates and patches."],
It enables organizations to detect and respond to threats faster.
[120, "It enables organizations to detect and respond to threats faster.", "It enables organizations to detect and respond to threats faster."],
It eliminates the risk of data breaches entirely.
[121, "It eliminates the risk of data breaches entirely.", "It eliminates the risk of data breaches entirely."],
When organizations can detect threats faster, they can take immediate action to prevent attackers from furthering their access. This could involve isolating compromised systems, blocking malicious activities, or initiating incident response procedures. This helps to reduce the risk of a data breach but doesn't eliminate it entirely.
[122, "When organizations can detect threats faster, they can take immediate action to prevent attackers from furthering their access. This could involve isolating compromised systems, blocking malicious activities, or initiating incident response procedures. This helps to reduce the risk of a data breach but doesn't eliminate it entirely.", "When organizations can detect threats faster, they can take immediate action to prevent attackers from furthering their access. This could involve isolating compromised systems, blocking malicious activities, or initiating incident response procedures. This helps to reduce the risk of a data breach but doesn't eliminate it entirely."],
Situational awareness is about relying on your security team to detect cyber threats.
[123, "Situational awareness is about relying on your security team to detect cyber threats.", "Situational awareness is about relying on your security team to detect cyber threats."],
Security teams play a vital role in keeping you and your organization safe from cyber attacks, but it's not a complete solution. Situational awareness is a tool at everyone's disposal. It's made strong by educating yourself, staying informed about threats, using cyber security best practices like using strong passwords, and trusting your instincts.
[124, "Security teams play a vital role in keeping you and your organization safe from cyber attacks, but it's not a complete solution. Situational awareness is a tool at everyone's disposal. It's made strong by educating yourself, staying informed about threats, using cyber security best practices like using strong passwords, and trusting your instincts.", "Security teams play a vital role in keeping you and your organization safe from cyber attacks, but it's not a complete solution. Situational awareness is a tool at everyone's disposal. It's made strong by educating yourself, staying informed about threats, using cyber security best practices like using strong passwords, and trusting your instincts."],
Wrapping up
[125, "Wrapping up", "Wrapping up"],
Having a high level of situational awareness means that you are equipped to detect the vast majority of attacks that cyber attackers send your way. Stay alert, stay aware, and stay one step ahead of the attackers!
[126, "Having a high level of situational awareness means that you are equipped to detect the vast majority of attacks that cyber attackers send your way. Stay alert, stay aware, and stay one step ahead of the attackers!", "Having a high level of situational awareness means that you are equipped to detect the vast majority of attacks that cyber attackers send your way. Stay alert, stay aware, and stay one step ahead of the attackers!"],
[127, "", ""],
Original Text (English)
Correct Translation (English)
Submissions are reviewed and applied within 48 hours.
Color Theme And Background Selector
×
Colorful Theme
Select Theme
Blue Theme
Select Theme
Light Theme
Select Theme
Purple Theme
Select Theme
Green Theme
Select Theme
Dark Theme
Select Theme
Note: The Colorful, Blue, Light, and Dark Themes are all WCAG 2.2 Level AA conformant.