USB Baiting: Don’t Take the Bait
- Mobile-Friendly, Self-Paced Format
- Nationally-Accredited, Regulatory-Approved
Course Description
Compromised USB drives can be used to inject malicious code, redirect you to phishing websites, or give a hacker remote access to your computer. In this video, an employee is faced with a decision that could ultimately decide the fate of his organization. Watch to find out what he does (or doesn’t do) to protect himself and what you can do to avoid being victimized by an uncanny social engineering attack.
We think our solutions are pretty great, and we aren’t the only ones. Here are a few of our latest accolades.