Enrolment options

The Insider Threats module covers topics on: danger insider threats pose, the three types of insider threats, and what to do if you observe suspicious activity. This course was developed to raise awareness about threats that may compromise not only you, but our company.

A compromised organization can lose money, intellectual property, and even its reputation. Detecting and handling criminal activity is crucial to the well being of our organization. Everyone is cautious of threats from outsiders, but organizations are also at risk from internal attacks.

Insider threats are of great concern because insiders have intimate knowledge of our network and systems. Threats from within might: illegally distribute confidential information, expose private business dealings, or defraud our organization or harm it financially.

Guests cannot access this course. Please log in.