Skip to main Content

Expert-Led Cybersecurity Events and Workshops

The Enemy Inside
How to Detect Supply Chain Attack & Stop it Before It’s Too Late.
October 6th at 12 PM EST


Technical Deepdive
with Containers, Kubernetes,
Red Hat OpenShift.
October 13th at 1 PM EST


Fireside Chat
Expert Advice on Starting a Career in Cybersecurity.
October 20th at 12 PM EST

Coming Soon

My Password is Too Strong for Attackers

While having a strong password can help keep most bad actors out, it may not keep all out. In this video, James talks about the ways attackers may take advantage of the shortcomings of password authentication and how to avoid becoming a victim.

The cyber myths debunked in this video:

- My password is too strong for an attack

- I’m not important enough to attack

Cyber Attacks Only Come From Outside Sources

It’s hard to believe that attacks may come from internal sources; for some, it’s the last place they’d expect. But, unfortunately, attackers may be closer than you think. James covers a few examples of security incidents from internal sources and the ways to prevent them.

The cyber myths debunked in this video:

- I can always spot or recognise an attacker or a breach

- We've not been breached before, so our security plan is good enough for the future

- I use security products, so I don't have anything to worry about

Social Media: My 'Friends' Wouldn't Scam Me

“We’re friends, right? My friends wouldn’t try to scam me.” In this video, James breaks down the various ways attackers can use a person’s friends list on social media to gain access to sensitive information.

The cyber myths debunked in this video:

- Those I know through social media can't hurt me

- I only visit common websites, so I'm safe

- I can always spot a scam because they are obvious

Resources to Improve Cybersecurity Everywhere for Everyone

10 Ways Everyone Should Approach Cybersecurity


Cybersecurity Month - Top Cybersecurity Training from a World Leader

Our vast cybersecurity training portfolio can help you and your team build critical skills — from fundamental to advanced — and prepare for top industry-recognized certifications.

  • Certified Ethical Hacker (CEH)
  • Certified in Risk and Information Systems Control  (CRISC)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISAU)
  • CompTIA Security+ (G013)

Why Cybersecurity Training
is so Important

> Our research shows 26% of IT professionals believe their cybersecurity skills aren’t where they should be. Further, almost half of IT decision-makers struggle to find qualified talent for vital roles. GK Polaris, our unlimited training subscription, is here to fix that.