World Leader in
                                                                                                   Cyber Intelligence™
Cyveillance Cyber Safety Awareness™ » Datasheet




Cyveillance Cyber Safety Awareness™
Keeping Abreast of Evolving Threats             The courses consist of a three-part series
Safety, trust and security are core to cus-     designed to be viewed either as a whole or
tomer retention, growth, and the long term      as a security awareness training course pro-
success of every company. While compa-          gram where each module progressively
nies must continually look for new ways to      makes students aware of increasingly more
increase efficiency and productivity, securi-   complex attacks. Focusing on specific areas
ty of accounts and sensitive customer           of cyber safety, each course builds on the
information is a top priority.                  foundations established by the preceding
                                                course. The courses are described below:
Everyone on the front lines of customer                                                        Robust Training and
service and delivery (not just IT personnel)    Intro to Cyber Safety                          Management Tools
must have a solid grasp on the growing          Using an “you are the target, you are the       • Role management
number of online threats facing the organi-     defense” approach to cyber safety this            capabilities provide granular
zation. That means an emphasis on ongo-         course covers the basic fundamentals of           control of customer-branded
ing education, starting with cyber safety.      cyber safety using real-world examples of         portal
                                                                                                • Status, score and duration
                                                today’s cyber threats combined with easy-
                                                                                                  shown for each attendee
Training from a Leader in Cyber Security        to-remember steps to protect users and
                                                                                                • History reports available for
The Cyveillance Cyber Safety Awareness™         the network.
                                                                                                  all attendees
training modules give employees a behind-
                                                                                                • Ability to require testing to
the-scenes look at the latest technologies      Malware and Advanced Social Engineering           ensure comprehension of
and techniques powering today’s most            Attacks                                           course
devastating Internet scams -- fraud, net-       Malware is well-known to pose many dan-         • Customizable notifications
work breaches, identity theft, and loss of      gers to both employees and organizations.         including enrollment, drop,
customer data. The courses provide best         What is lesser known is that most malware         and utilization rates
practices on how to safely navigate the         infections are delivered via socially-engi-     • Administrative tools allow
Internet, increasing awareness and height-      neered attacks. This course provides a look       for the tracking of attendee
ening each employee’s sense of responsi-        at the latest methods used by cyber crimi-        activity
bility.                                         nals to infect users and the network with
                                                malware and how many of these infections       Materials:
                                                can be avoided through safe Internet           As part of training, students will
                                                browsing habits.                               receive:
                                                                                                 • Course guide
                                                                                                 • Cyber tips for home and work
                                                                                                 • Cyber safety checklist
                                                                                                 • Recommendations and links
                                                                                                   to online tools
World Leader in
                                                                                                            Cyber Intelligence™
Cyveillance Cyber Safety Awareness™ » Datasheet




Focused, High-End Attacks                       A Safer Workforce
Cyber criminals are launching high-end,         By completing the training courses,
stealthy attacks against employees using        employees gain a better understanding of
intelligence gathered from the Web and the      how the most damaging cyber attacks are
social networking environment. This course      actually executed. Attendees will see how
provides an overview of how an employee’s       the profile of an individual increases expo-
Internet footprint can be leveraged to          sure to threats and how to better protect
enable cyber criminals to gain access to the    valuable data. Finally, attendees will learn
network and sensitive information along         which threats pose the greatest dangers
with steps the employee can take to pre-        today, which are likely to in the future, and
vent falling victim to these sophisticated      practical tools and tactics to proactively
attacks.                                        protect against them. The result is a more
                                                aware, informed team able to confidently
                                                leverage the latest online security best
                                                practices, enhancing customer confidence
                                                and gaining a competitive edge.




Securing the entire enterprise from online risks: the full suite from Cyveillance
Cyveillance provides a full suite of solutions to address online risks
enterprise-wide. Solutions include:

Anti-Phishing | Fraud Protection | ID Theft Protection | Information Protection | Corporate
Compliance | Corporate Security | Brand Protection | Distribution Control | Partner
Compliance

About Cyveillance
Cyveillance, a world leader in cyber intelligence, provides an intelligence-led approach to
security. Through continuous, comprehensive Internet monitoring and sophisticated intel-
ligence analysis, Cyveillance proactively identifies and eliminates threats to information,
infrastructure, individuals and their interactions, enabling its customers to preserve their
reputation, revenues, and customer trust. Cyveillance serves the Global 2000 and OEM
Data Partners – protecting the majority of the Fortune 50, regional financial institutions
nationwide, and more than 30 million global consumers through its partnerships with
security and service providers that include AOL and Microsoft. Cyveillance is a QinetiQ
Company. For more information, please visit www.cyveillance.com or www.qinetiq-na.com.




                                                                                                Copyright © 2011 Cyveillance, Inc. All rights reserved.
Cyveillance, Inc.                    888.243.0097                                               Cyveillance is a registered trademark of Cyveillance, Inc.
2677 Prosperity Avenue               www.cyveillance.com
Suite 400                            info@cyveillance.com
Fairfax, Virginia 22031

Cyber Safety Awareness Training (Brochure)

  • 1.
    World Leader in Cyber Intelligence™ Cyveillance Cyber Safety Awareness™ » Datasheet Cyveillance Cyber Safety Awareness™ Keeping Abreast of Evolving Threats The courses consist of a three-part series Safety, trust and security are core to cus- designed to be viewed either as a whole or tomer retention, growth, and the long term as a security awareness training course pro- success of every company. While compa- gram where each module progressively nies must continually look for new ways to makes students aware of increasingly more increase efficiency and productivity, securi- complex attacks. Focusing on specific areas ty of accounts and sensitive customer of cyber safety, each course builds on the information is a top priority. foundations established by the preceding course. The courses are described below: Everyone on the front lines of customer Robust Training and service and delivery (not just IT personnel) Intro to Cyber Safety Management Tools must have a solid grasp on the growing Using an “you are the target, you are the • Role management number of online threats facing the organi- defense” approach to cyber safety this capabilities provide granular zation. That means an emphasis on ongo- course covers the basic fundamentals of control of customer-branded ing education, starting with cyber safety. cyber safety using real-world examples of portal • Status, score and duration today’s cyber threats combined with easy- shown for each attendee Training from a Leader in Cyber Security to-remember steps to protect users and • History reports available for The Cyveillance Cyber Safety Awareness™ the network. all attendees training modules give employees a behind- • Ability to require testing to the-scenes look at the latest technologies Malware and Advanced Social Engineering ensure comprehension of and techniques powering today’s most Attacks course devastating Internet scams -- fraud, net- Malware is well-known to pose many dan- • Customizable notifications work breaches, identity theft, and loss of gers to both employees and organizations. including enrollment, drop, customer data. The courses provide best What is lesser known is that most malware and utilization rates practices on how to safely navigate the infections are delivered via socially-engi- • Administrative tools allow Internet, increasing awareness and height- neered attacks. This course provides a look for the tracking of attendee ening each employee’s sense of responsi- at the latest methods used by cyber crimi- activity bility. nals to infect users and the network with malware and how many of these infections Materials: can be avoided through safe Internet As part of training, students will browsing habits. receive: • Course guide • Cyber tips for home and work • Cyber safety checklist • Recommendations and links to online tools
  • 2.
    World Leader in Cyber Intelligence™ Cyveillance Cyber Safety Awareness™ » Datasheet Focused, High-End Attacks A Safer Workforce Cyber criminals are launching high-end, By completing the training courses, stealthy attacks against employees using employees gain a better understanding of intelligence gathered from the Web and the how the most damaging cyber attacks are social networking environment. This course actually executed. Attendees will see how provides an overview of how an employee’s the profile of an individual increases expo- Internet footprint can be leveraged to sure to threats and how to better protect enable cyber criminals to gain access to the valuable data. Finally, attendees will learn network and sensitive information along which threats pose the greatest dangers with steps the employee can take to pre- today, which are likely to in the future, and vent falling victim to these sophisticated practical tools and tactics to proactively attacks. protect against them. The result is a more aware, informed team able to confidently leverage the latest online security best practices, enhancing customer confidence and gaining a competitive edge. Securing the entire enterprise from online risks: the full suite from Cyveillance Cyveillance provides a full suite of solutions to address online risks enterprise-wide. Solutions include: Anti-Phishing | Fraud Protection | ID Theft Protection | Information Protection | Corporate Compliance | Corporate Security | Brand Protection | Distribution Control | Partner Compliance About Cyveillance Cyveillance, a world leader in cyber intelligence, provides an intelligence-led approach to security. Through continuous, comprehensive Internet monitoring and sophisticated intel- ligence analysis, Cyveillance proactively identifies and eliminates threats to information, infrastructure, individuals and their interactions, enabling its customers to preserve their reputation, revenues, and customer trust. Cyveillance serves the Global 2000 and OEM Data Partners – protecting the majority of the Fortune 50, regional financial institutions nationwide, and more than 30 million global consumers through its partnerships with security and service providers that include AOL and Microsoft. Cyveillance is a QinetiQ Company. For more information, please visit www.cyveillance.com or www.qinetiq-na.com. Copyright © 2011 Cyveillance, Inc. All rights reserved. Cyveillance, Inc. 888.243.0097 Cyveillance is a registered trademark of Cyveillance, Inc. 2677 Prosperity Avenue www.cyveillance.com Suite 400 info@cyveillance.com Fairfax, Virginia 22031