Cyber Awareness Training Threats identified: 0
Learn
Interactive

Cyber
Awareness.

31 interactive scenarios mapped to NIST, PCI-DSS, CMMC, and DoD standards. See if you're current.

NIST 800-50 NIST 800-53 FISMA PCI-DSS v4.0 CMMC Level 2 DoD 8140 HIPAA GDPR SANS Top 12
01 — Phishing & Social Engineering

The first thing you should always check.

Before you type anything — look up. The address bar tells you if the site is encrypted and if the domain is who it claims to be.

Which of these is safe to enter your password on?

http://mybank.com/login — Not Secure
Enter your username and password to continue.
https://mybank.com/login
Enter your username and password to continue.

But HTTPS doesn't mean safe. A phishing site can have a lock icon too. The lock means the connection is encrypted — not that the site is trustworthy.

One character. That's all it takes.

Click the real domain. Look carefully.

Attackers register domains that look identical at a glance. rnicrosoft.com — that's an r and an n, not an m. Also: paypa1.com (one not L), amaz0n.com (zero not O), g00gle.com (zeros). Check every character.

Links lie.

The text says one thing. The URL goes somewhere else. Hover these links to see where they really go:

Click the links you think are safe. Hover to preview the real URL first.

On mobile there's no hover — long-press links to preview the URL. If the domain doesn't match, don't tap.

Time to clean out the inbox.

Click each email to read it. Spot the phishing. Click the sender address to check if it's legit.

Inbox (6)
Select an email to read

Your texts lie too.

Phishing isn't just email. Check your messages.

9:41 AM LTE 47%
Messages

No links. No malware. Just a request.

This email passed every spam filter. There's nothing technically malicious in it.

Inbox
From: David Chen <dchen@company-corp.com>
To: you@company.com
Vendor payment — urgent and confidential
I need you to process a wire transfer of $47,000 to Meridian Partners before end of day. Account details below. This is tied to the acquisition — keep it between us until the deal closes.

Account: 4821-7793-0012
Routing: 091000019

Thanks,
David

The sender is dchen@company-corp.com. Your company is company.com — not company-corp.com. No links to click, no malware to scan. BEC cost organizations $2.9 billion in 2023 (FBI IC3). It's the #1 financial loss vector in cybercrime.

Incoming call: IT Support.

IT Support (ext. 4401)
Connected — 0:42
IT: Hi, this is Mike from IT. We detected unusual login activity on your account from an IP in Romania.
IT: I need to verify your identity real quick. Can you confirm your password so I can check the audit log?

Your boss is on the phone. Or is he?

You get an urgent call. The voice sounds exactly like your CFO.

David Chen — CFO
Connected — 1:14
CFO: Hey, it's David. I'm in a board meeting and can't talk long. I need you to wire $47,000 to a new vendor before 3 PM. I'll send the details after — just get it started now.
CFO: This is confidential — don't loop anyone else in until the deal closes.

Scan the code. Pay for parking.

You're at a parking meter. There are two QR codes — one is a sticker placed over the original. Tap one to scan it.

CITY PARKING — SCAN TO PAY
STICKER
Top QR (overlay)
Bottom QR (original)
Tap a QR code to scan
02 — Passwords & Identity

Type a password. We'll tell you how fast it dies.

Length beats complexity. correct-horse-battery-staple takes centuries to crack. P@ss1! takes seconds. Use a password manager — Bitwarden, 1Password, KeePass. Generate unique 16+ character passwords for every account.

You didn't try to log in.

You're watching TV. These notifications keep popping up.

What does incognito mode actually hide?

Check all that apply. Most people get this wrong.

Private Browsing Mode
03 — Malware & Software

Click to reveal what's hiding behind the name.

safe or malware?
Invoice_Q4.pdf
128 KB — PDF Document
✓ Safe
A normal PDF. The extension matches the file type. No hidden executable.
safe or malware?
Invoice_Q4.pdf.exe
2.4 MB — Application
✗ Malware
The real extension is .exe — an executable. The ".pdf" is fake decoration. Windows hides extensions by default.
safe or malware?
Report.xlsm
890 KB — Excel Macro-Enabled
~ Risky
.xlsm files contain macros that can execute code. Only open if you trust the sender AND verified with them directly.
safe or malware?
Photo.jpg.scr
1.1 MB — Screensaver
✗ Malware
.scr is a screensaver executable — it runs code. The ".jpg" is fake. Another hidden extension trick.

One of these is real.

Click the legitimate update notification.

System Update Available
macOS 15.2 is available. Includes security fixes and performance improvements.
Restart to install · 2.1 GB
CRITICAL UPDATE REQUIRED!!
Your Adobe Flash Player is OUT OF DATE! Your system is at RISK!! Click HERE to update NOW!
Update immediately · free download

The popup.

Software updates patch security vulnerabilities. Delaying them leaves you exposed to known attacks. Let's check your update status.

System Security Check
Checking for outdated software...
Operating System✓ Up to date
Web Browser✓ Up to date
Adobe Flash Player✗ Critical update required

This just appeared on your work computer.

YOUR FILES HAS BEEN ENCRYPTED
All your documents, photos, databases are encrypted.
To decrypt send 0.5 BTC to wallet address below.
23:59:47
bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh

You Googled "download VLC media player".

Pick the right result. Watch the URLs.

download VLC media player
04 — Physical Security

You're grabbing coffee.

Your laptop is open with email, Slack, and VPN connected. What do you do?

Spot the security violations.

Click every item on this desk that's a security risk.

Violations found: 0 / 5

Hey, can you hold the door?

You just badged through a secure door. Someone behind you with their hands full says "Left my badge at my desk — can you hold it?"

You found this in the parking lot.

USB Flash Drive
Label: "Q4 Payroll — Confidential"
05 — Network & Mobile

You're at the airport. Pick a network.

9:41 AM Airplane Mode 64%
Wi-Fi
Choose a network to join

Your phone is at 4%. Flight boards in 45 minutes.

4% — Low Battery
Gate B14 — Charging Station Available

You're working from a coffee shop.

You need to access the company VPN and check email. How do you connect?

06 — Data & Compliance

FreePDFConverter.com wants access.

This site already has clipboard access — granted silently when you pasted text. Most users never know.

Her profile is public. Find the risks.

Tap every post that leaks information an attacker could exploit.

Jessica M.
@jessicam · 1,247 followers
Risks spotted: 0 / 4

Convenient isn't the same as allowed.

Four workplace shortcuts. Acceptable or violation?

Not everything is confidential. That's the problem.

Classify each document. Over-classification is as bad as under-classification.

Which of these would you report?

Not every coworker having a bad day is a threat. But some patterns matter. Tap the behaviors that should be reported.

Indicators flagged: 0 / 4

When in doubt, report.

For each situation: report now, report later, or not reportable?

How'd you do?

threats identified out of 60
detection rate
Industry benchmarks (KnowBe4 2024 / Proofpoint 2024 State of the Phish):
34.3%
Avg phish-prone % before training
4.6%
Avg phish-prone % after 12 months
$2.9B
BEC losses in 2023 (FBI IC3)
71%
Orgs hit by phishing in 2024

The point.

Every interaction on this page is something that happens to real people every day. The cookie popup. The misspelled domain. The urgent email. The deepfake phone call. The parking lot USB. The MFA prompt at midnight. None of this is hypothetical — it's Tuesday.

The difference between a breach and a near-miss is usually one click. Stay skeptical. Hover before you click. Check the sender. Lock your screen. Use a password manager. Don't plug in random drives. Verify wire transfers by phone. Report the thing that feels off. And for the love of everything — reject the cookies.