cyber games
challenge (cgc)
Take a human approach to cyber security
Security BasicsNIST FrameworkPhysical SecurityRansomwarePhishingEmail ImpostersSupport ScamsVendor SecurityEmail Auth.Remote Access
CYBER
games
The Cyber Games Challenge gamifies a 10 Stage Cyber Security learning framework of international best practice standards for employees, members and stakeholders, and make it fun along the way. Each stage has a short video and infographic, followed by a short assessment to make sure they weren’t asleep at the wheel.
A certificate of completion is provided to all who complete the challenge, which can be revisited annually for businesses in need of visible cyber training records. For businesses who really want to incentive participation, we recommend offering a prize. #ipad?
How it Works
REGISTER
Simply click the green Get Started button at the top of this page to start your program.
ASSESS
Each Program provides a smart self assessment with a range of (mostly multiple choice) questions.
Some questions require evidence be provided, IF you require a Program Review in order to receive a Certificate of Assessment. to evidence your results
CERTIFY
To evidence results a Program Review is conducted by an human account manager.
Once approved users are issued a Certificate of Assessment to provide relevant stakeholders: clients, insurers, investors, etc.
ALL PROGRAMS include access to a digital library of amazing tools & resources
Challenge Components
Cyber Security Basics
Knowing the cyber security basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack.
NIST Framework
You may have heard about the NIST cyber security framework, but what exactly is it? And does it apply to you?
Physical Security
Lapses in physical security can expose sensitive company data to identify theft, with potentially serious consequences.
Ransomware
It looks legitimate – but with one click on a link, or one download of an attachment, everyone is locked out of your network.
Phishing
It seems to be from one of your company’s vendors and asks that you click on a link to update your business account. Should you click?
Email Imposters
A scammer sets up an email address that looks like it’s from your company. The scammer is what we call a business email impostor.
Tech Support Scams
You get a phone call, pop-up, message or email telling you there’s a problem with your computer, but often scammers are behind these.
Vendor Security
Your business vendors may have access to sensitive information, make sure they are securing their own computers and networks.
Email Authentication
Email authentication technology makes it a lot harder for a scammer to send phishing emails that look like they’re from your company.
Securing Remote Access
Employees and vendors may need to connect to your network remotely, so make them follow strong security standards before they connect.
Awaiting Completion
How To Videos
Start a Program
Complete a Program
Use the Digital Library