Want to create interactive content? It’s easy in Genially!
Cybersecurity Training
Senior Resources of West Michigan
Created on September 18, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Microcourse: Team Cybersecurity
View
Microcourse: Key Skills for the Professional Environment
View
Microcourse: Introduction to HTML
View
The Meeting Microlearning
View
The Meeting Microlearning Mobile
View
Isometric video mobile
View
Circles video mobile
Transcript
microcourse
Cybersecurity Training
start
What will you learn?
In this microcourse you will learn the basics of:
Apply key actions to promote safe habits.
Understand what cybersecurity is in work environments
Identify practices that reduce digital risks
Basic concepts
Attacks where someone tries to trick you into obtaining personal information (passwords, banking data).
Basic habits to keep your information and devices secure (updates, passwords, backups).
Method that adds an extra layer of security by requesting more than one verification method.
Multifactor authentication (MFA)
Digital hygiene
Phishing
They often contain spelling errors, unusual urgencies, or strange links. Never click or download files if you doubttheir origin.
A strong password combines letters uppercase and lowercase, numbers, and symbols. Avoid using personal data and update it frequently.
Team collective commitment to apply good cybersecurity practices daily
Suspicious emails
Security culture
Secure password
HOW WE promote cybersecurity in your team:
Be aware of real and common cybersecurity threats. You’ll receive monthly test emails designed to help you recognize and respond to phishing and other digital risks.
Use basic protection tools (MFA, antivirus, passwords). Ask question about these protection tools if not understood.
We promote digital transparency by encouraging open communication about errors, doubts, or possible incidents.
Steps to promote cybersecurity in your team:
We limit access, according to needs, to documents, platforms, and tools. Not everyone needs full access.
We have clear roles of responsibility for Information Management.
Know our protocols: on what to do or act in case of an incident.
click on words adove to review policies.
Steps to promote cybersecurity in your team:
We review and update security policies. Security rules are not static. Changes happen continuously.
Be aware that simulations are conducted: Exercises such as phishing simulations or intentional errors help detect behavioral gaps and improve response.
Lead by example: Empower your team/co-workers through consistent, visible habits.
We leave you extra resources to continue deepening
click links below for additional information
Quick guide to best practices in cybersecurity
Explainer video: What is phishing?
How to report Phishing
Test what you've learned!
Complete the blanks with the keywords:
Promote safe habits, digital awareness, and shared responsibility among the whole team. Security is not only the technical area’s responsibility: it’s everyone's.
Strong passwords, frequent updates, caution with suspicious links, use of multi-factor authentication… The basics that truly protect.
Recognizing attempts of phishing, unauthorized access, or malicious files is key to act quickly and avoid damage in the team’s digital environment.
Good digital practices
Threat Identification
Cybersecurity Culture
Security starts with you. Change your habit, protect your team.
Ready to apply what you've learned?
Key Actions to Promote Safe Cybersecurity Habits
Use all available processes to reduce digital risk, including:
- Think before you click—avoid suspicious links and unexpected attachments.
- Verify requests for sensitive information, even if they appear to come from known contacts.
- Report phishing attempts using the Report function in Outlook or forward the email to phishing@srwmi.org.
Cybersecurity
Cybersecurity in the workplace is the practice of safeguarding an organization’s digital systems, networks, and data from unauthorized access, theft, or damage. It relies on a strategic blend of technology, policies, and employee training to prevent, detect, and respond to threats such as phishing, malware, and data breaches. The ultimate goal is to uphold the confidentiality, integrity, and availability of sensitive information—while maintaining trust with participants, vendors, and partners.
Some practices that reduce your digital risk
Use strong passwords: At least 12 characters, 16 - 24 is recommended.Keep software updated: When a restart is needed for update, use restart computer. Be cautious online: Be suspicious of unsolicited emails, attachments, and downloads. Do not click on suspicious links or share personal information in response to requests. Secure your home networks: Secure your home Wi-Fi network with a strong password and consider using a firewall. Avoid using public USB ports to charge devices.