Spotting phishing emails
Ransomware recovery stories
Cybersecurity + wellness connection
Reducing digital distraction
Social media oversharing risks
Real ransomware attack examples
Common malware types
Using VPNs safely
Why reusing passwords is risky
What is an insider threat
Password Phishing
Reporting suspicious emails
Ransomware as a Service
Email misdelivery risks
Multi-factor authentication in cloud apps
What to do if your password is leaked
Acceptable use of organization’s devices
USB and external device risks
Handling sensitive information safely