• Identifying phishing emails and social engineering tactics
  • Steps to take when encountering suspicious activity
  • Reporting procedures for cybersecurity incidents