TrainingBriefs® Cybersecurity & Fraudulent Payments
TrainingBriefs® Course

TrainingBriefs® Cybersecurity & Fraudulent Payments

7 Minutes New Level: Foundational

Cybersecurity policies and procedures set clear expectations for how an organization protects its systems, data, and users from digital threats. They define required behaviors, roles, and safeguards, and provide step-by-step guidance for preventing incidents and responding effectively when issues arise. They specifically help prevent costly fraudulent payments.

Target Audience: General
Language: English

Cybersecurity

Features

  • Audio Narration
  • Interactive Exercises
  • Video
  • Post-Assessment

Learning Objectives

  • Understand how not following verification procedures can end up in costly fraudulent payments.
  • Learn the importance of scrutinizing all inbound email requests (specifically for payment requests).

Description

Cybersecurity policies and procedures establish clear rules and steps to protect an organization’s data and systems - especially when it comes to fraudulent payments. Following them ensures consistency, reduces risk, and prevents mistakes.

  • Do not take shortcuts on processes that are in place to confirm the identity of approved and existing vendors.
  • When employees are involved with the transfer of funds, employees should always take the extra step of verifying that the request is legitimate by making a phone call to verify a request.
  • The phone call should not be to a phone number provided in an email request, since fraudsters will likely substitute a phony number, but to a phone number the company already has on file.

Industry Settings

  • Healthcare
  • Industrial & Manufacturing
  • Office & General
  • Retail

Compatibility Notes

  • Supports iPhone & iPad App: TrainingFlow™ App on iOS devices
  • Supports Android App: TrainingFlow™ app on Android devices
  • Supports Current Browsers: Chrome 60+, Firefox 60+, Safari 12+, Edge 16+


Share on Social Networks