Essentials TrainingPrepared for Southeastern Pneumatic
Module 1 of 3
EnglishEspaƱol
Welcome
Security Awareness Training

Cybersecurity 101

Understand why cybersecurity matters and the critical role you play in protecting our organization from digital threats.

Cybersecurity awareness introduction

What You Will Learn

This training is designed for every employee at Southeastern Pneumatic. No technical background is needed. You will learn practical skills you can use immediately.

1
Cybersecurity 101Why cybersecurity matters and your role as the first line of defense.
2
Phishing & Suspicious MessagesHow to spot fake emails, texts, and phone calls designed to steal your information.
3
Passwords, Accounts & Workplace SecurityCreating strong passwords, protecting your accounts, recognizing manipulation, and physical security.
Estimated timeAbout 10 minutes per module. You can complete all three in roughly 30 minutes.

Why Cybersecurity Matters

Cyber attacks are not just a problem for large corporations. Small and mid-size businesses are increasingly targeted because attackers know they often have fewer security resources and less formal training.

60%
of confirmed breaches involved a human action
22%
of breaches started with stolen credentials
44%
of breaches involved ransomware
Source: Verizon 2025 Data Breach Investigations Report
Common cyber threats overview

What Is at Stake

If an attacker gains access to our systems, they can reach sensitive information that affects every employee:

  • Financial losses from fraudulent wire transfers, invoice manipulation, or ransomware demands.
  • Your personal data including pay stubs, tax forms, Social Security numbers, and bank details in the HR system.
  • Customer and partner data that our company is responsible for protecting.
This has happened to usOur company has previously been targeted by attackers who impersonated a partner/vendor account to send convincing messages to our employees. The incident resulted in real financial impact to the company and carried legal implications. These attacks are real, they target companies like ours, and the consequences go beyond just a security issue.

You Are the Human Firewall

Our company invests in technology like firewalls, email filters, and antivirus software. These tools catch a lot of threats, but they cannot stop everything.

Attackers design their messages specifically to bypass automated defenses. When a suspicious email reaches your inbox or a strange phone call comes through, YOU are the last line of defense.

Employees as the human firewall

What Being a Human Firewall Looks Like

  • Pause before clicking. Take a moment to evaluate any link or attachment before interacting with it.
  • Question unexpected requests. Especially if they involve urgency, money, credentials, or bypassing normal procedures.
  • Verify through a separate channel. If an email asks you to do something unusual, confirm by calling the person directly.
  • Report anything suspicious. Even if you are not sure. It is always better to report something harmless than to ignore a real threat.
  • Protect your credentials. Your password is the key to your accounts and the sensitive data behind them.
RememberYou do not need to be a technology expert. Being cautious, asking questions, and reporting concerns are the most powerful tools you have.

Knowledge Check

Answer all 5 questions to test what you have learned.

Passing score: 80% (4 out of 5)
Question 1 of 5
You receive an email that feels slightly off. The wording is unusual and the sender address looks close to, but not exactly like, a coworker's. You are not sure if it is real or a threat. What should you do?
Select your answer:
Question 2 of 5
What does it mean to be the "human firewall"?
Select your answer:
Question 3 of 5
Southeastern Pneumatic has previously experienced which type of cyber attack?
Select your answer:
Question 4 of 5
Which of the following is something YOU can do as part of the human firewall?
Select your answer:
Question 5 of 5
Why are small and mid-size businesses increasingly targeted by cyber attackers?
Select your answer: