We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.

Click Thinking Content

  • Last updated on

One click on a malicious link is all it takes to unleash the worst the internet has to offer. Click Thinking content encourages users to think before they act, providing helpful examples and insights that make training and learning fun. It also covers a wide range of information security topics relevant to today’s security-aware companies.

Click links on this page to download complimentary content.

Web Browsing and Work

Released December 2018

webBrowsingImage.png

Informs employees about the risks and ramifications of browsing the web at work.

Internet of Things

Released November 2018

IOT-Info.png

Alerts viewers to the risks of using internet-connected devices.

Public WiFi

Released September 2018

Public-Wifi-Infographic.jpg

A look at the risks of using public wifi and ways to protect yourself.

Bring Your Own Device (BYOD)

Released August 2018

BYOD-infographic.jpg

Examines risks to using one device for both personal and business purposes.

Professional Networking

Released July 2018

Professional-Networking-Screensaver.jpg

Tips to protect you and your company when networking professionally.

Applications

Released June 2018

Applications-Infographic.jpg

Explores the dangers of downloading apps from the Internet.

Vishing and Smishing

Released May 2018

Vishing-and-SMiShing-Infographic.jpg

A closer look at the practices of voice phishing (Vishing) and text phishing (SMiShing) with an emphasis on protecting business.

Personal and Physical Security

Released April 2018

Image-PP-Security-Infographic.jpg

We focus on personal and physical security concepts using fun personas to identify the types of tactics cybercriminals use to gain access to secure areas.

Travel and Out of Office

Released March 2018

Travel.png

An in-depth look at cybersecurity threats that can arise during business travel and ways to protect your data and company network while on the road.


Business Email Compromise

Released February 2018

BEC-infographic.png

We examine how cybercriminals pull off business email compromise scams in an engaging and stylish comic-style format.

 

Personally Identifiable Information

Released January 2018

Jan2018.png

A look at what qualifies as personally identifiable information (PII) and how cybercriminals use it to commit crimes like identify theft.

 

2017 Archive

Ransomware

Ransomware.png

Phishing Emails

phishingEmails.png

Social Media

SocialMedia.png

 

Spear Phishing

spearphishing.png

 

Network Security

networkSecurity.png

Removable Media

removablemedia.png

Last updated on