GoldPhish Cyber Security Awareness Training
GoldPhish Cyber Security Awareness Training
  • 51
  • 115 008
Hyperlink Hazards: How to Stay Safe Online
Hyperlinks are a common and useful part of our online experience, but they can also be a gateway for cyber threats if not handled with care. In today’s episode, we dive into why hyperlinks can be risky, how to identify and avoid malicious links, and what steps to take if you accidentally click on a harmful link. Stay informed and learn how to protect yourself from potential cyber attacks linked through seemingly harmless hyperlinks.
____________________________________________
Video timestamps:
00:00 - Introduction
00:31 - What makes hyperlinks so dangerous?
02:17 - What should you look out for when you come across a hyperlink?
____________________________________________
🔗Useful tools:
URL Void - www.urlvoid.com/
Check Short URL - checkshorturl.com/
____________________________________________
🌍 Our sites:
Website: www.goldphish.com/
Blog: www.goldphish.com/blog
Free training: www.goldphish.com/start-your-free-training
Free resources: www.goldphish.com/public-portal
Pricing: www.goldphish.com/pricing
Become a Partner: www.goldphish.com/msp-partners
____________________________________________
🔔 Our socials:
LinkedIn: www.linkedin.com/company/goldphish/
____________________________________________
🥳 Client Reviews:
G2: www.g2.com/products/goldphish/reviews
Capterra: www.capterra.co.za/software/1011440/goldphish
____________________________________________
มุมมอง: 42

วีดีโอ

How to Dodge Phishing Emails
มุมมอง 715วันที่ผ่านมา
Phishing is one of the most prevalent tactics used by cyber criminals when doing social engineering scams. In today's episode, we highlight why phishing scams are so prevalent, how to avoid them and what to do when confronted with a phishing attack. 🌍 Our sites: Website: www.goldphish.com/ Blog: www.goldphish.com/blog Free training: www.goldphish.com/start-your-free-training Free resources: www...
The Insider Threat
มุมมอง 44914 วันที่ผ่านมา
Often an organisation’s biggest threat to their data and security is right under their nose. This interactive training module examines the potential for a company’s own employees, either intentionally or unintentionally, to inflict damage on the organisation. Users will learn how to recognise insider threats and learn basic best practices to protect against them. Video timestamps: 00:00 - Intro...
The Red Flags - Spotting Scams in Emails and Messages
มุมมอง 3.1K14 วันที่ผ่านมา
Hey there! So you think you're a target of a phishing, smishing or vishing attack? In this video, we break down the growing threat of phishing attacks and social engineering. Learn how to spot red flags in these attacks and how to your protect yourself online. Video timestamps: 00:00 - Introduction 00:28 - Recognising the red flags in deceptive messages (phishing and social engineering) 03:19 -...
Compromised Passwords: Impact and Ways to Prevent This
มุมมอง 16021 วันที่ผ่านมา
Hey there! So you think you've been compromised, so now what? In this video, we break down the growing threat of cybercrime and how to prevent passwords from being compromised. Learn how to secure your protect yourself online with MFA, what to do if you think your passwords have been compromised and the tools to check whether your passwords are still safe. Check if your email address is in a da...
What are Passkeys and how to use them?
มุมมอง 208หลายเดือนก่อน
Hey there! In this video, we break down the growing trend of passkeys. Learn how to securely use passkeys, how they work and how they can enhance your overall cyber security. Video timestamps: 00:00 - Introduction 00:32 - What are Passkeys and how do they work? 02:13 - How did Passkeys become so popular? 04:06 - How are Passkeys different from traditional passwords? 05:11 - How are Passkeys dif...
Cyber Essentials: 7 Key Tips to Safeguard Yourself Online
มุมมอง 485หลายเดือนก่อน
Hey there! Ready to level up your cyber security game? In this video, we break down the growing threat of cybercrime and share seven essential tips to protect yourself. Learn how to secure your sensitive info, create strong passwords, and control access to your systems with ease. We also explore how to mitigate the human factors and errors in cyber security. Video timestamps: 00:00 - Introducti...
Using Biometrics Because You're Not a Robot (Yet)
มุมมอง 542 หลายเดือนก่อน
Good old Biometrics are here to save the day - yet again. Biometrics are like those futuristic gadgets in spy movies - except they’re real, and you’re the star. We're talking fingerprint scanners, facial recognition, and even voice recognition. We outline how to optimally setup and use Biometrics to add an extra layer of security. Video timestamps: 00:00 - Introduction 00:43 - What are biometri...
Using Browser-Based Password Managers
มุมมอง 2512 หลายเดือนก่อน
Using Browser-Based Password Managers
Developing a Successful Security Awareness Training (SAT) Programme
มุมมอง 1663 หลายเดือนก่อน
Developing a Successful Security Awareness Training (SAT) Programme
Social Media Safety | GoldPhish
มุมมอง 2.4K3 หลายเดือนก่อน
Social Media Safety | GoldPhish
What is Ransomware? | GoldPhish
มุมมอง 6893 หลายเดือนก่อน
What is Ransomware? | GoldPhish
AI Voice Cloning Scams - New Scam Tactic To Watch Out For
มุมมอง 1843 หลายเดือนก่อน
AI Voice Cloning Scams - New Scam Tactic To Watch Out For
Using Password Managers to Optimise Your Cyber Security
มุมมอง 3084 หลายเดือนก่อน
Using Password Managers to Optimise Your Cyber Security
What is Single Sign On (SSO) and how can it keep you safe?
มุมมอง 814 หลายเดือนก่อน
What is Single Sign On (SSO) and how can it keep you safe?
Top 10 Tips on How to Safely Browse the Web | GoldPhish
มุมมอง 2K6 หลายเดือนก่อน
Top 10 Tips on How to Safely Browse the Web | GoldPhish
How to create strong passwords
มุมมอง 1836 หลายเดือนก่อน
How to create strong passwords
Enabling and Maintaining MFA
มุมมอง 836 หลายเดือนก่อน
Enabling and Maintaining MFA
The Top 10 Cyber Safety Tips to Secure Your Home | GoldPhish
มุมมอง 5K6 หลายเดือนก่อน
The Top 10 Cyber Safety Tips to Secure Your Home | GoldPhish
How to Avoid Black Friday and Festive Season Scams
มุมมอง 1869 หลายเดือนก่อน
How to Avoid Black Friday and Festive Season Scams
What are Social Engineering Scams and how to avoid them? | GoldPhish
มุมมอง 2.2K10 หลายเดือนก่อน
What are Social Engineering Scams and how to avoid them? | GoldPhish
The Road to 1 Million
มุมมอง 3710 หลายเดือนก่อน
The Road to 1 Million
Introduction to Cyber Security | GoldPhish
มุมมอง 7K11 หลายเดือนก่อน
Introduction to Cyber Security | GoldPhish
Introducing GoldPhish - Your Gateway to Empowering Cyber Heroes!
มุมมอง 521ปีที่แล้ว
Introducing GoldPhish - Your Gateway to Empowering Cyber Heroes!
What is Mobile Device Security? | GoldPhish
มุมมอง 13Kปีที่แล้ว
What is Mobile Device Security? | GoldPhish
Money Traps: A Deep Dive into Tax Scams
มุมมอง 62ปีที่แล้ว
Money Traps: A Deep Dive into Tax Scams
What is Business Email Compromise?
มุมมอง 768ปีที่แล้ว
What is Business Email Compromise?
The Rise of Business Email Compromise: A Growing Threat to Global Enterprises | GoldPhish
มุมมอง 3.3Kปีที่แล้ว
The Rise of Business Email Compromise: A Growing Threat to Global Enterprises | GoldPhish
What is Security Awareness Training?
มุมมอง 4Kปีที่แล้ว
What is Security Awareness Training?
Cyber Resilience: How Businesses Can Leverage Cyber Insurance
มุมมอง 10Kปีที่แล้ว
Cyber Resilience: How Businesses Can Leverage Cyber Insurance

ความคิดเห็น

  • @KS-ne5mq
    @KS-ne5mq 2 วันที่ผ่านมา

    There’s always been scammers. Before the internet and mobile devices they would do things like leave fake scratch off’s under vehicle windshield wipers. They made it where you won so you’d have to contact them. I knew to call the Better Business Bureau to see if it’s legit. It wasn’t legit.

  • @iwashere8493
    @iwashere8493 4 วันที่ผ่านมา

    Really nice explanation , thanks !

    • @goldphishcybersecurity
      @goldphishcybersecurity 2 ชั่วโมงที่ผ่านมา

      Thank you - we love that you're enjoying our content.

  • @xtryker1
    @xtryker1 4 วันที่ผ่านมา

    These videos are gold, very informative and simple. Keep them up. I don't understand why it's so low on views and likes...

    • @goldphishcybersecurity
      @goldphishcybersecurity 2 ชั่วโมงที่ผ่านมา

      Thank you! We love that you enjoying our content!

  • @natalialuiz7009
    @natalialuiz7009 6 วันที่ผ่านมา

    Insightful and comic!

    • @goldphishcybersecurity
      @goldphishcybersecurity 5 วันที่ผ่านมา

      We glad you found it insightful! Thanks for the feedback.

  • @kunaltrivedi11
    @kunaltrivedi11 11 วันที่ผ่านมา

    Hey man, Thanks for making it easy to understand, Thanks from 🇮🇳🇮🇳🇮🇳

  • @goldphishcybersecurity
    @goldphishcybersecurity 20 วันที่ผ่านมา

    Begin your journey with GoldPhish for free → www.goldphish.com/start-your-free-training

  • @boyananakiev4896
    @boyananakiev4896 หลายเดือนก่อน

    Great talk, Dan is very articulate - love the short to the point answers. I think one disadvantage of passkeys not mentioned is the same as password managers - if someone gets ahold of your device AND can mimic your biometric or knows your PIN then he not only gains access to your device but to you microsoft account/google account/whatever account uses the passkey since he would already have everything that's needed to login to those accounts. If using passwords (and have unique strong ones on each different service) this is not the case as if someone gains access to your device and does crack your biometrics or pin code, he wont necessarily be able to then login to your gmail/microsoft/passkey accounts since they would require seperate passwords. It's simillar to the age old debate of what happens if someone cracks your master password on your passwrod manager. Of course, this is mostly a technicality because it's much more unlikely for someone to get ahold of your device AND crack its PIN/Biometrics than for them to phish your password or crack it or by breach the vendor and steal it.

    • @goldphishcybersecurity
      @goldphishcybersecurity 28 วันที่ผ่านมา

      Thank you! We delighted you enjoyed our video and found it insightful.

  • @iopjkl8913
    @iopjkl8913 หลายเดือนก่อน

    First

  • @jolin1947
    @jolin1947 2 หลายเดือนก่อน

    May I use the video as the training material? Thank you.

    • @goldphishcybersecurity
      @goldphishcybersecurity 2 หลายเดือนก่อน

      Feel free to use our content on our TH-cam channel.

  • @RuvarasheTakanakaMusungw-zo9nu
    @RuvarasheTakanakaMusungw-zo9nu 2 หลายเดือนก่อน

    Best video ever. The graphics got me hooked. I actually understood everything and remembered afterwards. Vi ddnt have to cram

  • @MIND-BLOWING25
    @MIND-BLOWING25 3 หลายเดือนก่อน

    youtube.com/@mind-blowing25?si=kjzAwHgh6sE6T8E1

  • @NICOLASTORRETTI
    @NICOLASTORRETTI 3 หลายเดือนก่อน

    great video love the hard work!!

    • @goldphishcybersecurity
      @goldphishcybersecurity 3 หลายเดือนก่อน

      Glad you found it insightful! Thank you for your comment

  • @TanmaySharma-hj2et
    @TanmaySharma-hj2et 3 หลายเดือนก่อน

    Thanks for teaching me about how to stay safe from scams!

  • @KaylaSisco
    @KaylaSisco 3 หลายเดือนก่อน

    Great video! A lot of information in a short video. Pishing scams happen EVERYDAY. It is important to know the signs and be aware.

  • @Masjudimahpuy
    @Masjudimahpuy 4 หลายเดือนก่อน

    Scams/phisings/Alerts are coming from boil frauds systems that programmed by hackers automaticly ... aftee hacked & robbed !!

    • @Masjudimahpuy
      @Masjudimahpuy 4 หลายเดือนก่อน

      *After It will only make the victim through confusing & sick in tiredness !. This is a Cruel Criminal & Gmail/Ymail or any providers must responsible for this !

  • @zootie925
    @zootie925 5 หลายเดือนก่อน

    A question about the example password: when you say "this can be your master password, one password to rule them all" that seems to contradict the next mandate of never using the same password for different things. Have I misunderstood?

    • @goldphishcybersecurity
      @goldphishcybersecurity 5 หลายเดือนก่อน

      Excellent question. Your master password or passphrase should be the one password you remember. This should be a unique, strong password which has never been used before. Remember this one password as you should be saving your different passwords in a Password Manager.

  • @zootie925
    @zootie925 5 หลายเดือนก่อน

    can I get some of the videos without the watermark please?

    • @goldphishcybersecurity
      @goldphishcybersecurity 5 หลายเดือนก่อน

      Feel free to start a free trial and gain access to all of our content for free.

  • @nadiaulfah8655
    @nadiaulfah8655 5 หลายเดือนก่อน

    What a content! Thanks for sharing

  • @bautisupercool1783
    @bautisupercool1783 5 หลายเดือนก่อน

    Primer comentario!!!!!!!!😊😊😊

  • @jirkapaidar3516
    @jirkapaidar3516 5 หลายเดือนก่อน

    🤣 "PromoSM"

  • @zootie925
    @zootie925 5 หลายเดือนก่อน

    hi, would like to use this video for part of our cyber training info session. Is that ok?

    • @goldphishcybersecurity
      @goldphishcybersecurity 5 หลายเดือนก่อน

      Hi there. Yes please feel free to use our content. If you'd like access to our FULL platform and all our content, feel free to start a free trial :)

    • @zootie925
      @zootie925 5 หลายเดือนก่อน

      Thank you kindly. I'm just using it in a powerpoint prezo inhouse at work. We give 6 monthly info sessions on cybersec, and your video covered all the basics we needed, and it is fun to watch, which helps get the message across! @@goldphishcybersecurity

  • @Infinity-ce4qz
    @Infinity-ce4qz 5 หลายเดือนก่อน

    So concise and well animated :), the tips are a bit basic but still might be helpful for someone new 🙂

  • @baio1292
    @baio1292 6 หลายเดือนก่อน

    Super video !

  • @druewilliamthuysman680
    @druewilliamthuysman680 7 หลายเดือนก่อน

    Great content !

  • @felstrex1
    @felstrex1 7 หลายเดือนก่อน

    Great video. It had a ton information packed in and it was a condensed version of the ideas with little BS that is not needed. I am currently working on a project and this was a great tool for me to watch and help me get a better understanding of what phishing is and a few simple ways to deal with it that are common sense but easily overlooked, especially in a high stress and busy work or home environment. Great Job, thanks again.

  • @crazyboy-ms7gk
    @crazyboy-ms7gk 8 หลายเดือนก่อน

    Funny way to learn

  • @djg450
    @djg450 9 หลายเดือนก่อน

    Great Video!

  • @natalialuiz7009
    @natalialuiz7009 9 หลายเดือนก่อน

    Loved this one! 🎉

  • @rohiniseera5328
    @rohiniseera5328 11 หลายเดือนก่อน

    Wowwwww this is such a great video😂

  • @iamjoefar
    @iamjoefar ปีที่แล้ว

    Beautiful. I hope to see more content geared towards the ways that physical and cyber security work together. I've been working on the physical side for a few years while i've been in college for cyber. I've noticed there is such a large disconnect between physical and cyber (in most cases), that opens up some large vulnerabilities. I loved the example of the IT employee that had been fired and security was unaware and let him in. Absolutely a real world example. The most effective security, is when information can flow easily enough that everyone can be on the same page about it. If HR terminated an employee, IT needs to know so they can disable their accounts, Physical security needs to know so they can revoke their access rights to the facilities. Beautiful video.

    • @goldphishcybersecurity
      @goldphishcybersecurity ปีที่แล้ว

      Thank you for your insight! We are delighted that you enjoyed our content - be sure to subscribe to receive all our latest content.

  • @ghanshyamsharma1682
    @ghanshyamsharma1682 ปีที่แล้ว

    So informative Dan, Best of luck.

  • @bereacomputers9463
    @bereacomputers9463 ปีที่แล้ว

    Thank you for sharing.

    • @goldphishcybersecurity
      @goldphishcybersecurity ปีที่แล้ว

      We are delighted that you enjoyed our content. We have some exciting content coming in 2023!