TrainingBriefs® Course
TrainingBriefs® Cybersecurity & Fraudulent Payments
7 Minutes New Level: Foundational
Cybersecurity policies and procedures set clear expectations for how an organization protects its systems, data, and users from digital threats. They define required behaviors, roles, and safeguards, and provide step-by-step guidance for preventing incidents and responding effectively when issues arise. They specifically help prevent costly fraudulent payments.
Target Audience: General
Language: English
0

Features
- Audio Narration
- Interactive Exercises
- Video
- Post-Assessment
Learning Objectives
Description
Cybersecurity policies and procedures establish clear rules and steps to protect an organization’s data and systems - especially when it comes to fraudulent payments. Following them ensures consistency, reduces risk, and prevents mistakes.
- Do not take shortcuts on processes that are in place to confirm the identity of approved and existing vendors.
- When employees are involved with the transfer of funds, employees should always take the extra step of verifying that the request is legitimate by making a phone call to verify a request.
- The phone call should not be to a phone number provided in an email request, since fraudsters will likely substitute a phony number, but to a phone number the company already has on file.
Learning Topics
Industry Settings
- Healthcare
- Industrial & Manufacturing
- Office & General
- Retail
Compatibility Notes
- Supports iPhone & iPad App: TrainingFlow™ App on iOS devices
- Supports Android App: TrainingFlow™ app on Android devices
- Supports Current Browsers: Chrome 60+, Firefox 60+, Safari 12+, Edge 16+
