Do you need Cyber Hygiene resources now?

Download our cyber hygiene checklists to share with your coworkers, friends and family. They are filled with helpful tips that can easily be implemented whether you are working from home, in the office or just want to better protect your personal data. These checklists and more are included as additional resources with our onsite and remote cyber security awareness training courses.

Find the fake email

Criminals love a crisis. The threat landscape that is over taking the globe is a perfect cover for scammers to infiltrate your defenses. Phishing emails are on the rise, making fake claims about your accounts. Their hope is to use fear and uncertainty to trick you into giving away private data. Download our Cyber Hygiene Checklist to share with your remote workforce to protect their cybersecurity.

find the fake email

Remote Video Conferencing

Social distancing lead to an increase in remote workers, causing a surge in video conferencing. Recent reports from the FBI on “Zoom bombing” shed light on the need for proper security settings to protect your video conferences. Download our Cyber Hygiene Checklist to see how to best secure your video conference before and during the meeting.

Remote Video Conferencing

Social distancing lead to an increase in remote workers, causing a surge in video conferencing. Recent reports from the FBI on “Zoom bombing” shed light on the need for proper security settings to protect your video conferences. Download our Cyber Hygiene Checklist to see how to best secure your video conference before and during the meeting.

Home office cybersecurity

When you’re in the office, security measures are put in place by management and IT. Now that most people are working from home, those security measures fall on you to set up. Download our tips to secure your home office to best protect yourself and your company from cyber crime.

home office cybersecurity

Pretexting Scams

Pretexting is when a scammer impersonates someone you know, like a coworker, or fabricates an identity. These scams are based on trust. They convince you of their validity, getting you to willingly give out your information. While this scam is not new, it is on the rise. Find out what to look for and how to protect yourself.

pretexting
pretexting

Pretexting Scams

Pretexting is when a scammer impersonates someone you know, like a coworker, or fabricates an identity. These scams are based on trust. They convince you of their validity, getting you to willingly give out your information. While this scam is not new, it is on the rise. Find out what to look for and how to protect yourself.

Device cybersecurity

Is your computer up-to-date? Do you have the best defenses? Or does the thought of an upgrade overwhelm you? Making sure you have the latest operating system is important to your cybersecurity. Find out a simple way to see what you’re running and if you need an update.

upgrade
cyber hygiene

Get your cyber hygiene checklists today!

Please tell us a little about yourself

Thank you for downloading our checklists

Download the case study

Learn more about how CyberCompass has helped companies just like you!

Thank you for downloading our case study

Download the case study

Learn more about how CyberCompass has helped companies just like you!

Thank you for downloading our case study

Share This