Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

Learn Online Security

34 members • Free

12 contributions to Learn Online Security
There is a shark in the water...^...
One problem with constantly focusing on security issues is that we become a negative voice. Every post is, "watch out for this", "these people are coming after you". I recently spoke with another podcast host who has the same problem. We decided that some, maybe not all, of the topics can be covered with a focus on hope or self-improvement vs. "the sky is falling". The other problem is that doom-and-gloom content gets more views. I would rather provide you with hope and a lifeboat than a finger pointing at a shark. What do you think?
3 likes • 9d
Very true. I wonder if the focus can be on removing stress, fixing problems, and the confidence that brings instead. But to some extent the topics are inherently dark, people do get scammed out of their life savings, and it can be tragic
When everybody suddenly knows you’re away—are you protected? 👀
Most people don’t realize how fast scammers move the moment your name shows up in a program, an event brochure, or even your kid’s school conversation. If you lost control of the message today, would your team know what to do? Would your clients know who to call? Would your family know how to respond? If the answer is “not really”… you’re not alone. ➡️ We just published a new blog on how to take back control before attackers try to exploit your absence. https://learnonlinesecurity.com/blog/protect-your-team-when-everyone-knows-you-re-away What’s one thing you think people overshare without realizing it?👇 Drop your answer in the comments.
When everybody suddenly knows you’re away—are you protected? 👀
4 likes • 17d
Great rundown covering what to do if information gets out of your hands. It is surprisingly common for information to become public knowledge!
De-cluttering is all the rage.
What happens when that impromptu 10-minute power clean turns into a data breach? When it comes to business security, most owners focus on software, firewalls, and encryption. But one often-overlooked risk lies in how people handle devices at the end of their life—from old laptops and phones to printers and fax machines. Every device that stores or transmits information is a potential leak point, and the human factor plays a critical role in keeping that data safe. What device were you surprised to learn was a potential security risk?
2 likes • 23d
@Brayden S That one surprised me too
Christmas Security Workshop: Don’t let your business be an easy target
The holidays are prime time for hackers and scammers. Don’t let your business be an easy target. Learn the most common Christmas-season scams and discover quick, practical steps to keep your data, staff, and customers safe. Join for free today! Register TODAY! https://www.bankert.ca/contact-us/workshops Virtual Event Information Event Date: November 5, 2025, 1:00-2:00 pm CST or join through the calendar link on Skool! We’re keeping it small, you in? https://youtube.com/shorts/rPjlYRsmwx0?si=hgo-k99d1H7GSI-n&views
1 like • Nov 4
I want scammers to get coal in their stockings
Social engineering has officially become attackers’ favorite way in.
The latest data shows 36% of breaches started with manipulation — not malware. (https://www.cybersecuritydive.com/news/social-engineering-preferred-initial-access/803363/) Attackers are now using voice cloning, deepfakes, and fake “help desk” calls to reset credentials. 👉 What stood out to you most in this article? 👉 Do you think training and awareness can actually keep up with this?
Social engineering has officially become attackers’ favorite way in.
4 likes • Oct 28
With the right training and procedures people and businesses can protect themselves. But it's a matter of taking those things seriously in the first place.
1-10 of 12
Rhia D
3
32points to level up
@rhia-d-5911
Hello

Active 4d ago
Joined Sep 9, 2025