Videos

Welcome to our collection of videos related to general security topics and products and services.
Black Hat Hackers
Black Hat Hackers

Black hat hackers are the most infamous characters on the hacking spectrum. We've covered white hat hackers and grey hat hackers; now, learn about the black hats in the finale of our three-video series on hackers. All in just 60 seconds.

Security in 60 Seconds - Deepfakes
Security in 60 Seconds - Deepfakes

The use of Deepfakes is rising in politics, financial markets, and even in organizational espionage. Do you know how to recognize one, or the steps to take to learn if the information you digest is accurate? Learn more in this episode of S...

Security in 60 Seconds   Insider Threats
Security in 60 Seconds Insider Threats

Insider threats present real risks to organizational security. What's the difference between an accidental insider threat and a malicious one? Find out in this episode of Security in 60 Seconds!

Security in 60 Seconds   QR Code Safety
Security in 60 Seconds QR Code Safety

QR code use has skyrocketed, but scanning with caution is essential as they can potentially lead to malicious websites or trigger malware downloads, posing security risks to personal data and device integrity. Learn more in this episode of...

Security in 60 Seconds - Grey Hat Hackers
Security in 60 Seconds - Grey Hat Hackers

Grey hat hackers are individuals who straddle the ethical boundary between black hat and white hat hacking. Learn about them in part two of a three-video series on hackers, all in just 60 seconds!

Security in 60 Seconds - White Hat Hackers
Security in 60 Seconds - White Hat Hackers

White hat hackers are ethical computer security experts who use their skills to identify and fix vulnerabilities in systems, networks, and software. Unlike malicious hackers, known as black hat hackers, white hat hackers operate with the i...

Security in 60 Seconds - Unique Passwords
Security in 60 Seconds - Unique Passwords

Mastering the art of creating unique passwords is paramount. Safeguarding your digital presence with distinct and robust passwords shields personal information and fortifies the bulwark against cyber threats, ensuring a resilient defence a...

Security in 60 Seconds - MetaData
Security in 60 Seconds - MetaData

Metadata is to hackers as cheese is to mice. It contains information that could potentially put you at risk. In this short expose, we will highlight what it is and how hackers can use it for ill gain.

Security in 60 Seconds -Tax Frauds
Security in 60 Seconds -Tax Frauds

It's tax time and you owe money to the government, surprise surprise... Now you're ready to make your remittance. How can you be sure that your money arrives at its intended destination and not caught up in some tax fraud scheme? Watch thi...

Security in 60 Seconds - Romance Scams
Security in 60 Seconds - Romance Scams

Love is in the air, and hackers are on the hunt. This time of season is ripe with bad actors taking advantage of people's emotions and money. Take a look at just some of these examples of romance scams and beware. Love may be blind, but yo...