Want to create interactive content? It’s easy in Genially!

Get started free

Cybersecurity Training

Senior Resources of West Michigan

Created on September 18, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Word Search: Corporate Culture

Microlearning: How to Study Better

Microcourse: Artificial Intelligence in Education

Microcourse: Key Skills for University

Microcourse: Learn Spanish

How to Create the Perfect Final Project

Create your interactive CV

Transcript

microcourse

Cybersecurity Training

start

What will you learn?

In this microcourse you will learn the basics of:

Apply key actions to promote safe habits.

Understand what cybersecurity is in work environments

Identify practices that reduce digital risks

Basic concepts

Attacks where someone tries to trick you into obtaining personal information (passwords, banking data).

Basic habits to keep your information and devices secure (updates, passwords, backups).

Method that adds an extra layer of security by requesting more than one verification method.

Multifactor authentication (MFA)

Digital hygiene

Phishing

They often contain spelling errors, unusual urgencies, or strange links. Never click or download files if you doubttheir origin.

A strong password combines letters uppercase and lowercase, numbers, and symbols. Avoid using personal data and update it frequently.

Team collective commitment to apply good cybersecurity practices daily

Suspicious emails

Security culture

Secure password

HOW WE promote cybersecurity in your team:

Be aware of real and common cybersecurity threats. You’ll receive monthly test emails designed to help you recognize and respond to phishing and other digital risks.

Use basic protection tools (MFA, antivirus, passwords). Ask question about these protection tools if not understood.

We promote digital transparency by encouraging open communication about errors, doubts, or possible incidents.

Steps to promote cybersecurity in your team:

We limit access, according to needs, to documents, platforms, and tools. Not everyone needs full access.

We have clear roles of responsibility for Information Management.

Know our protocols: on what to do or act in case of an incident.

click on words adove to review policies.

Steps to promote cybersecurity in your team:

We review and update security policies. Security rules are not static. Changes happen continuously.

Be aware that simulations are conducted: Exercises such as phishing simulations or intentional errors help detect behavioral gaps and improve response.

Lead by example: Empower your team/co-workers through consistent, visible habits.

We leave you extra resources to continue deepening

click links below for additional information

Quick guide to best practices in cybersecurity

Explainer video: What is phishing?

How to report Phishing

Test what you've learned!

Complete the blanks with the keywords:

Promote safe habits, digital awareness, and shared responsibility among the whole team. Security is not only the technical area’s responsibility: it’s everyone's.

Strong passwords, frequent updates, caution with suspicious links, use of multi-factor authentication… The basics that truly protect.

Recognizing attempts of phishing, unauthorized access, or malicious files is key to act quickly and avoid damage in the team’s digital environment.

Good digital practices

Threat Identification

Cybersecurity Culture

Security starts with you. Change your habit, protect your team.

Ready to apply what you've learned?

Key Actions to Promote Safe Cybersecurity Habits

Use all available processes to reduce digital risk, including:

  • Think before you click—avoid suspicious links and unexpected attachments.
  • Verify requests for sensitive information, even if they appear to come from known contacts.
  • Report phishing attempts using the Report function in Outlook or forward the email to phishing@srwmi.org.

Cybersecurity

Cybersecurity in the workplace is the practice of safeguarding an organization’s digital systems, networks, and data from unauthorized access, theft, or damage. It relies on a strategic blend of technology, policies, and employee training to prevent, detect, and respond to threats such as phishing, malware, and data breaches. The ultimate goal is to uphold the confidentiality, integrity, and availability of sensitive information—while maintaining trust with participants, vendors, and partners.

Some practices that reduce your digital risk

Use strong passwords: At least 12 characters, 16 - 24 is recommended.Keep software updated: When a restart is needed for update, use restart computer. Be cautious online: Be suspicious of unsolicited emails, attachments, and downloads. Do not click on suspicious links or share personal information in response to requests. Secure your home networks: Secure your home Wi-Fi network with a strong password and consider using a firewall. Avoid using public USB ports to charge devices.