Online Security – Best practices to protect your small business from internet threats

No one is excused from cyberattacks. Even your small business could fall victim to one attack or another. With all the important sensitive data you have involving your clients and staffs; the repercussion of a breach can be serious and frightening. For this reason, it is necessary to take precaution, establish rules and measures to use against attacks over the internet.

Here are some of the most important steps every small business should be taking to protect themselves from cyberattacks.

  • There are a number of ways files can be lost unexpectedly, this is why it is important to frequently backup data. Save it in a secured remote location in case anything goes badly wrong with your computer.
  • Choose the best security software that can:

– catch viruses and Trojan horse programs

– control spam that may contain malicious code or links

– detect financial hacking techniques

Many security software are available on the market. Make sure to install it on every PC and server running and up-to-date.

  • Protect your network with a firewall to control internet traffic coming into and flowing out. You need to use a firewall whenever you go online to provide protection from unsafe internet sources.
  • Implementing a strong password is the easiest and simplest way you can do to strengthen your protection. You should definitely avoid using your personal data in creating a password and consider setting a password protection policy where you can make user passwords expire after a certain number of days.
  • Computers and electronic devices must contain passwords and stored and lock in a safe place. They contain highly sensitive data, thus, securing them is a must. In addition, limit the people who have access to records and ensure that they understand the sensitivity of the data they work with and their role to make it safe and secure.
  • Stored paper receipts with personal and financial information shouldn’t be kept for a long time in your cabinet if it is no longer needed. Buy a paper shredder and shred those papers instead.
  • Do not underestimate the importance of physical security. Get a surveillance camera and an alarm system to protect your personnel, hardware, and data from physical actions and events that may cause severe loss or damage to your business.
  • Establishing IT security policies is essential to a company’s health. It must contain rules and measures that target the prevention and elimination of the common kinds of internet attacks that may threaten the company. Make sure that your employees will understand and follow each guideline and you yourself should set a good example to everyone else in the business.

Cyber Security – How to Minimize the Risk of Becoming a Victim of Identity Theft

The technology today provides new ways for cybercriminals to steal personal and financial informations to commit fraud. As authorities continue to create and improve cybercrime fighting tactics, the methods used by criminals to steal identities evolve over time as well. Below are some ways to defend yourself against attacks.

  1. Many people have many different online accounts which use the same one, two or three passwords. This is the common mistake for many people as it makes them more vulnerable to cyberattacks. Do not use obvious passwords that can be easily guessed by cybercriminals and frequently change your passwords on each account.
  2. Cybercriminals will definitely send emails pretending that they are from the bank and will require you to input your personal and financial details in one of their bogus websites. If this happens, ignore the message. If the email truly bothers you, call your bank instead.
  3. Frequently check your financial reports for unquestionable transactions. Contact your bank immediately if you found one.
  4. Shred your documents by using a paper shredder before dumping them all in the trash. Cybercriminals might obtain important information if you don’t properly dispose those receipts and bank statements you have.
  5. Request for a compilation of all your credit transactions. Examine those credit reports for wrong details and quickly report it to your bank if there’s any.
  6. If you notice questionable transactions on your account then file a “Fraud Alert”. A fraud alert can make it harder for identity thieves to open more accounts in your name because it will require verifying your identity first before it issues credit.
  7. Do not bring your Social Security card outside if it isn’t necessary. Unexpected things may happen, it is better left at home.
  8. Identity thieves can make a way to recover all your deleted files from a formatted hard drive, so it is better to completely remove data on hard drives using different ways available on the market.

The Top Cyber Security Risks in Asia-Pacific In 2017


Cybercriminals will continue to innovate through ransomware

The malware business is a business like any other: cyber threat groups compete and innovate, with the most successful growing and spreading rapidly. Given the success of ransomware in 2016, we will see a continuation of ransomware attacks – with new innovations emerging and propagating, according to whichever attracts most payment.

2016 saw real innovation in the ransomware market, with a particularly interesting recent variant called ‘Popcorn Time’ that allows the victim’s files to be decrypted for free if they can infect two other people.

Commoditized versions of ransomware will, however, be a less pervasive threat for large corporations, as they gradually improve the management of this threat and their ability to mitigate it. Rather, criminals will target high-value assets using more sophisticated and innovative ransomware variants, and will develop additional functionality to seek out more lucrative individual targets within organizations, to enhance the chance of victims paying ransoms. Criminals will extort victims not only by threatening to deny access to data, but also by threatening to publish sensitive data.

Website defacements will be old school – website ransoms will be the new tactic

One specific kind of attack we expect to grow is website ransomware, where the contents of websites are targeted. This trend started emerging in Asia last year:

  • In November, several websites were found to be compromised and their web contents encrypted by a ransomware variant called JapanLocker. Control Risks’ research into this variant reveals that it was developed by a hacker known as Shor7cut, a member of the Indonesian Defacer Tersakiti group. This group is well known in the Indonesian hacking community and has more than 22,000 members.
  • In October, several Pakistani government websites were compromised and their contents encrypted by the CTB-Locker ransomware. The hackers, believed to be from the Indian group known as Hell Shield Hackers, used this method to retaliate after Pakistani hackers breached nearly 7,000 Indian websites.
  • In March, a ransomware variant known as KimcilWare was spotted targeting websites running the Magento eCommerce platform. This variant is thought to have been developed in Indonesia.
  • Also in March, Kaspersky Lab detected more than 70 servers, located in ten countries, compromised by the CTB-Locker ransomware. Most of the victims were from the US; this shows how threat actors in Asia Pacific are taking successful tools from other regions, adapting them, and applying them in their own region.

Such attack techniques will continue to emerge and evolve in 2017. We foresee further ransomware variants of this kind being developed by threat actors in Asia Pacific, and used for cyber activist and cybercriminal activities in the region.

Preventing Insurance Fraud – What is an Insurance Adjuster?

Most of us know what an insurance company is. But just what is an insurance adjuster?

Sometimes it’s not clear who adjusters are and how they’re trained for the job. (After all, how many colleges offer “insurance adjusting” as a major?)

To get some answers, we went behind the scenes with Chad Smith, a property specialist at Erie Insurance who handles large losses. Read on to learn more about him and all the important ways he helps Customers in their time of need. (And feel free to check out our short video above to learn even more!)

In your own words, what is an insurance adjuster?

To me, an insurance adjuster is someone who has a great deal of responsibility and accountability. An adjuster owes that not just to the company he or she represents, but to the customers who’ve experienced a loss.

At Erie Insurance, adjusters are the ambassadors of the company. People don’t really see how an insurance company works until they have a loss, and we represent that.

What kind of background do you need to become an adjuster?

More often than not, you need to have a college degree. I have a business degree, but insurance adjusters can pursue other fields as well. I would also recommend adding computer and math classes to your coursework.

How did you become an adjuster?

ERIE hired me as an adjuster shortly after graduating from college. I went through a few months of training that included both classroom and field training. I was tested on information and then spent some time out in the field with seasoned adjusters and appraisers to learn about what they did first hand. Because I work directly for an insurance company, I don’t need a license to be an adjuster. However, the rules vary by state.

What kind of skills do you need as an adjuster?

Being people-oriented is a must. You need to be able to empathize with the Customer by putting yourself in their shoes. Honesty and integrity are essential in establishing trust.

Because of the way the field is evolving, you need to be really comfortable with technology or be willing to learn it. To grow as a professional adjuster, you have to move beyond in-house training and pursue professional insurance designations like the Chartered Property Casualty Underwriter (CPCU) and Associate in Claims (AIC).

What’s a normal day like?

There really is no normal day. And that’s one reason why I love my job!

In order to handle it, you have to structure your days to a certain degree, but also maintain flexibility. I might plan to make calls all morning—but if I get an urgent claim, I need to reorder my day. I’m always busy.

What hours do you work?

I usually start early and end late. Sometimes I work weekends. I enjoy a lot of freedom with this position—and I’m available almost 24/7 because that’s how you provide great service. You can’t be stuck in the traditional nine-to-five, Monday through Friday mindset as an adjuster.

What’s the most memorable claim experience you’ve had?

Over the years, I’ve had many. One that stands out is working during the 2011 tornado catastrophes in North Carolina, Virginia and Tennessee. ERIE was the first insurance company on the scene. There was a lot of damage, but I was able to respond quickly and help Customers affected by the tornadoes. The fast response was made possible by the way ERIE set up its catastrophe team units. Some people I spoke to said neighbors with other carriers hadn’t even heard from their adjusters yet. It was extremely gratifying to help ERIE’s Customers when they really needed it.

What’s the most gratifying part of your job?

Knowing in my heart that I did the best I could for ERIE and for the Customer on every claim that I handle. I remember one claim we had to deny; even still, the Customer sent me a card thanking me for how polite and helpful I’d been during the process. Everyone should receive the same level of service, regardless of the outcome.

Do you have the backing of a company that offers the kind of top-notch service Chad delivers? If not, contact a local Erie Insurance Agent in your community to discuss your options and get a free quote.

Heimdal Online Security – Weekly Security Roundup #53: There’s a Scam for That


It’s been a tumultuous week for cyber security professionals. Between a large array of scams and the TalkTalk breach, the same key subjects are touched on again and again:

  • password security
  • software patching
  • cyber security education, even in its most basic form.

We’ve shown how trusted brands, such as IKEA, are being used in spam campaigns to trick victims into opening malware-laden attachments. The same type of attack impersonated, and it’s likely that these type of threats will continue to multiply.

This waves of spoofing attacks have determined Google to take Gmail and move it to the strictest DMARC implementation available, in order to keep its users protected from spoofing and spam attacks.

Dridex is active again and it seems like everyone’s had enough of it, but that doesn’t mean that it’s not pilfering unsuspecting users as you’re reading this.

In this context, corporate cyber security may sound like a nightmare to deal with (and we’re not saying it’s not). This is why our CEO, Morten Kjaersgaard, shared some thoughts on a matrix that can help prioritize tasks and investments in cyber security tools. It could really help CIOs and CISOs in need.

Let’s review the weekly security roundup to see the must-read news that could help us all be a bit more savvy about our online protection.

Security articles of the week

  1. Updates on the TalkTalk breach

The case of one of the biggest data breaches recorded this year has escalated rather quickly. There have been extortion attempts, a teenager was arrested for alleged involvement in the attack, and cyber security specialists discussed the worrying fact that this was the third attack on the British company in the past 12 months.

But are companies like this one just hiding behind implausible excuses? John E. Dunn seems to believe so.

  1. Spam and malware go hand in hand

Spam used to be rather harmless back in the day, but now it comes with attachments that trigger serious malware infections or malicious links that can compromise your system in a matter of seconds. Take this example of a campaign that impersonated UK policemen or this one that targeted website owners with fake suspension notices.

  1. Cyber crime and politics often mix

We’d certainly not want this to be so, but cyber criminals and politics never could stay apart when it comes to malicious activity. Such is the case of the Russian cyber spies who targeted the MH17 crash investigation and attempted to compromise the data used in it.

  1. Serious lack of basic cyber security awareness

Pluging a USB stick you found on the street in your work laptop could have potential disastrous consequences. This may sound obvious to you, but it turns out that it’s not as evident for everyone. A recent social experiment unveiled some unnerving facts.

  1. New online habits, new scams

“There’s a scam for that” is the new “there’s an app for that”. Lured in by free wine offerings? Get some malware instead. If it’s too good to be true, it most certainly is a trap.

  1. October’s list of data breaches and cyber attacks

It does not look good. But do see for yourself.

  1. Don’t leave your laptop in your hotel room

It may sound safer than carrying it around with you, but this real life example will prove you wrong.

  1. Fixing IoT’s broken security model

We know it needs to be done, but how? This article offers a perspective on where we could start. And we have to start. As soon as possible.

  1. Apparent browser ransomware targeting porn sites

Ransomware is such a scary threat that even impersonating is has started to become effective. Attackers have been threatening porn websites’ users recently, tricking them to pay hefty sums through scareware in their browser. More than 50 countries have already been affected.

  1. What will 2016 bring?

It’s not too early to start pondering on what next year may look like in terms of cyber security. We already singled out trends like ransomware, mobile malware and hacktivism, but we have to be prepared for anything and continue to work to reduce vulnerabilities that attackers can exploit.


We might reach a point where there are so many types of malware that there’s a different variant to target a user according to his deepest vulnerabilities. It’s already happening, but we’re not helpless against the bad guys.

A little can go a long way in terms of educating ourselves and those around us to adopt some basic online security habits. You can even learn all about them for free!

BEWARE: Cyber Criminals are Having a “Field Day” with Software Vulnerabilities by Heimdal Security Company


Heimdal Security just completed a widespread intelligence analysis of system software vulnerabilities. Our data clearly shows that the problem of software vulnerabilities is actually growing and you may think that companies already got better at closing security gaps faster.

The Bad News

The main problem here is that time periods between patches don’t follow and fix the great amount of vulnerabilities that continue to appear.

Some vendors are improving though.

Security holes in software is arguably one of the most used attack vectormalicious hackers employ in a modern IT environment, with exploits accounting for 60 – 90% of the attack , depending on which data you look at.

This is precisely one of the reasons why you would think that software companies should be very quick at closing their security gaps, but the actual situation indicates quite the opposite.

If we take a quick look at the most vulnerable 3rd party software in the market, the list narrows in on some of the most used software components in the world.

The Numbers Speak for Themselves

The top 4 pieces of most commonly used vulnerable 3rd party software in 2012 / 2013 / 2014 are:

  1. Oracle Java Runtime environment
  2. Adobe Acrobat Reader
  3. Adobe Flash Player / Plugin
  4. Apple Quicktime

Of these 4, Adobe Flash Player accounts for 314 registered vulnerabilities alone in 2015. That comes to 26 vulnerabilities PER MONTH! The next piece of software on the list is Acrobat Reader with 130 vulnerabilities or 10,8 per month, still quite high, but not as extreme.

All this data is more than scary. Intelligence shows that usage of Java, Acrobat Reader and Adobe Flash Player is very common on business computers and has been for a while. The good news is that Flash usage has dropped significantly, mainly because HTML 5 replaced the need for having it installed, but also because Flash was a preferred attack vector in 2015. Meanwhile, the widespread usage of software is most likely linked to the fact that we consume more and more data on the computer, and that we access a broader variety of software to do so.

Most likely, your private computer system is not much different from a standard business computer, therefore consumers, as well as companies, should be very aware there is a crucial risk here.

Corporate Security Risks are High

We now know 4 key facts which should have your full attention, since they put you or your corporate data at risk:

  1. The top 4 pieces of vulnerable 3rd party software is and has always been vulnerable to attacks
  2. Vulnerabilities are severe and there is a high number of them!
  3. Most computer systems actually use a minimum of 3 top vulnerable software presented here
  4. Cyber criminals commonly exploit and develop attack vectors for these vulnerabilities

Knowing all this, you may think that manufacturers keep us safe by quickly fixing these problems for their users and customers. Well, our analysis indicates that is not the case.

So what can you do to protect yourself or your company?

  • Make sure your 3rd party software is as up to date as possible, at all times. You can use an external tool to keep your software patched for you.
  • Protect yourself using a Traffic checking service, such as Heimdal Pro/Corp, because most exploit attacks have a vector originating from the Internet. Corporations should potentially add a Bluecoat, CSIS Secure DNS, Palo Alto or Fireeye solution for an extra layer of centralized scanning.
  • Use a corporate spam filter to remove phishing or exploits focused on malicious emails. This way, you have 2 layers of protection against malicious URLs, which may be heading for your computer. Consumers can use a client based filter and businesses can used a centralized solution.

Heimdal Security Company: 50+ Cyber Security Online Courses You Should Know About [Updated]


When I started working in the cyber security sector, I brought along my knowledge and experience with marketing, PR and startups.

But in order to really make the most of them, I had to learn about cyber security and REALLY get to know the field.

So I designed a mission for myself:

To find the best cyber security course for beginners that was out there!

The thing is, I had no idea how difficult that would be!

You’d think that, with all the millions of results that Google provides for every search, it would be easy to find the starting point I needed! But that’s not exactly the case…

Finding the perfect cyber security training is difficult because of 3 reasons:

1. Quality courses for beginners are rare!

There are just not enough cyber security courses for beginners out there! When you want to learn in a very organized manner (like I wanted), you need more than articles and shallow information.

2. Technical lingo is difficult to assimilate without context.

If you can’t speak “cybersec”, you’ll have a difficult time getting stuff done.

I felt that from day one when I started out in this field.

So it took me quite some time to find the right course that would offer context and good examples that could make the professional jargon stick.

3. Delivering information without ACTING on it is USELESS!

This is a very common mistake I’ve seen while doing my research.

If the course isn’t designed to make you ACT ON IT, you’ll just browse through the information and be left with close to nothing in the end.

That’s why we had to do homework in school. That’s why I do my best to practice what I preach on this blog.

Because I want you to save you the hassle I went through, I decided to put together the list below.

What you can expect to find in this list of cyber security courses:

• Free or paid cyber security training resources delivered online
• Training options for both beginners and advanced professionals
• General and specific training possibilities, and link to help you search for a particular subject you may be interested in.

I don’t claim I’ve put together an exhaustive list, so I welcome any recommendations and additions you may find useful.

By combining our experiences, I believe we can arrive to a list that can be used along the road and passed along to those who’d like to SAVE TIME and EFFORT while trying to enhance their knowledge.

So let’s see what cyber security training options are out there and what you can complete online!


Do you have the time, but no money to invest in training yet?
I’m sure many of you are in this situation, which is why I’d like to suggest some FREE options when it comes to learning about cyber security:

Cyber Security for Beginners

After giving it much thought and consideration, we decided to take a step towards sharing our experience and knowledge with others seeking applicable advice. We’re not claiming to be experts, but working in the cyber security field certainly gives you access to information which other people may not get to as easily.

So we organized an online course that would help people get the basic of cyber security through actionable advice. To us, the applicability of this course was essential, which is why we condensed the information in 20 step-by-step lessons that will teach you how to secure your online world.
The course is free and it’s delivered via email. You’ll get a new, helpful lesson each 2 days. You can register right away (it’ll only take a minute – literally)!

Cyber Security for Small Business Owners

If you’re a small business owner, we have something created especially for you. This course has two parts: in the first part, you’ll learn the basics of cyber security from a personal standpoint. Once you’ve nailed down the fundamentals, the second part of the course will teach you how to ensure the must-have safeguards for your business. This includes protecting your clients’ data and adapting to the EU Data Protection Regulation, if your business is located in the EU.

This course is developed by the Heimdal Security team in partnership with the London Digital Security Centre (LDSC).


Introduction to cyber security – I’ve taken this course myself, and it’s probably one of the best out there! The content is well structured, the assignments are easy to do and you’ll really get substantial knowledge from it.

Cyber Security: Safety at Home, Online, in Life also looks very appealing. The course is 3 weeks long and promises to offer a guided, practical introduction into cyber security for personal use.


This is a great platform to look for learning resources!
Here are some of the courses you can find on there:
Cyber Security
Cyber Criminals Want Your Information: Stop Them Cold!
Security Awareness Campaigns (Lite)

If you’re looking for something specific, you can filter the courses on Udemy by applying several filters:

• By price
• By language
• By instructional level
• By features.

This way, you’ll get exactly what you need, without losing hours on end browsing through the courses listed on the platform!
udemy cyber security courses

Canvas Network

Try to see if Introduction to Cybersecurity is right for you.


Cyber Security 101 and Cyber Security 201 could be a great way to start your career path in the field. The courses are free, of course, and you can learn whenever you can.

If you want to learn more about the LEAP platform, which is not as widely known as other MOOC platforms, I encourage you to do so.

The Daily Security Tip

While this is not a course per se, it’s a fun and easy way to grow your online security know-how. The way it works is you sign up using your email address to get a security tip every day, for a full year, for free. The tips are actionable and include plenty of examples of how to tweak your security and privacy settings online to better protect yourself and your data. And they’re short, so you can spend 2-3 minutes/day doing something to improve your Internet security.

If you have some budget for your training, you can consider the PAID options below:


Introduction to Cyber Security and Be Safe – Cyber and Physical Security For Everyone are two courses that make a very good first impression. If you’re looking to invest some money in your future career (maybe) or in your passion for online safety, these are two very good options.

Concise Courses

Interested in diving into a specific area of the information security industry? Maybe this Malware Awareness Training is an option you will find useful.
And if you want to explore more options, Check the other courses offered by Concise!


If you didn’t start from scratch, like I did, and you want to become more proficient at certain cyber security specialties, the recommendations bellow might help.
FREE online training courses for cyber security professionals:

ISIS Laboratory

This course was developed from the materials of NYU Poly’s old Penetration Testing and Vulnerability Analysis course.

MIT Open Courseware

Network and Computer Security and Computer Systems Security are both great options to consider for advancing your professional knowledge at no cost.

These training options include beginner, intermediate and advanced classes and they’re all FREE of charge! Subjects range from Android forensics to secure coding and vulnerability assessment.

Khan Academy

Intro to Cryptography is a great way to learn about code breaking and how cryptographic methods work.

Rapid 7

Metasploit Unleashed is an ethical hacking training course that will help you dip your toes in the waters of penetration testing for free. And you’ll also be able to make a charitable donation for a good cause, should you feel like it.

Cyber Security is an amazing resource of free online cyber security courses for professionals of various levels and experiences. You’ll be able to learn about social engineering, computer forensics, ethical hacking and more, just by investing your time and energy.
Internet Security Tips from Top Experts Ebook


Coursera offers plenty of options, being one of the biggest MOOC platforms in the world. You can start with any of the courses we picked below, but you should also explore the course list according to your interest. Don’t forget to use the handy filters: categories, language, if it’s eligible for certifications or specializations and if the course is on demand.


A good selection of free courses for more advanced cyber security security professionals includes:

Build Your Own Cyber Lab at Home
CCNA Security 2015 Free Video Boot Camp: CCP And More
Cyber Security For Beginners. Avoid Business Data Breaches
Cyber Security: Build a Secure, Resilient Company
Introduction to Cyber Security
How to Get a Job in Cyber Security

Georgia Tech College of Computing

Introduction to information security is presented as “a graduate-level introductory course in information security,” so you should be prepared for a structured way to learn a lot about the fundamental elements of information security.
Looking to get more info about this particular program? You can find it right here.

SANS Cyber Access

By taking this course, you’ll be able to explore the three fundamental areas of information security: Operating Systems, Networking and Systems Administration. You’ll consolidate both your skills and knowledge, so you can start whenever you’re ready.


An introduction to information security requires that you’re quite advanced in your knowledge of cyber security. The course focuses on the importance of cyber security in a business context, while also emphasizing its impact on the organization. Very useful for those who want to grow and reach higher ranks in their company’s cyber security department.

There will be one million cyber security job openings in 2016 – what will do about this opportunity?

If you’re a cyber security professional, you’ll certainly agree with me when I say that:

Investing in your continuous development is ESSENTIAL!
So if you’re already set on spending some money (wisely) on a great training program, I have made a list for you as well:

PAID online training courses for cyber security professionals:

Carnegie Mellon University, Software Engineering Institute, CERT Division

They list 3 major categories of course and you can find them all listed on this page:

• Incident Handling
• Network & Software Security
• Risk Assessment & Insider Threat.

CERT is a major institution when it comes to cyber security training, so you can fully rely on their resources to help you achieve your professional development goals!

SANS Institute

They also offer Online Security Training, so do check it out, because they’re as trustworthy as CERT in the field. You can take the course in various forms, from on-demand to live or through self study, whichever fits your way or learning best.


We have to mention them again, because on Coursera you’ll find an entire specialization dedicated to Cybersecurity Fundamentals, which will help you earn the following knowledge and abilities:

• Usable Security
• Software Security
• Cryptography
• Hardware Security

The specialization is created and taught by professors and specialists from the University of Maryland, College Park, and also by industry specialists.
cybersecurity fundamentals coursera

Canvas Network

Information Security and Risk Management: An Overview will help you become more aware of the legal implications of managing cyber security in organizations. Study topics include:

• Information security strategies and individual privacy
• Legal security implications
• Medical health record confidentiality and integrity
• Cutting-edge technologies.

Learning Tree

From “Cyber Security for Management and the Boardroom” to “Cyber Security: Accessibility and Quality“, LearningTree offers a wide range of courses for infosec professionals.
You should take your time to read the course descriptions thoroughly before starting a course and see where they fit in your career path.

Stanford University

You can pick your favorite from various courses offered by this prestigious educational institution:
Software Security Foundations
Network Security
Emerging Threats & Defenses

Mind you that these courses require advanced skills and knowledge to complete.

Security Tube

Security training online courses provides at least two interesting subjects to study:

• USB Forensics
• Android Security and Exploitation and almost a dozen others to consider.


Here you’ll find some very technical and very specific courses, such as:

• Python for Pentesters
• Scripting Wi-Fi Pentesting Tools in Python
• Wi-Fi Security and Pentesting and more.

These courses boast using real-world scenarios which will help you try your hand at situations that you can come across in your professional practice.

The Virus Doctor

Advanced Techniques for Virus Removal is a great course for those involved in the business of computer repairs and assistance. As technology evolves, more people will need help with identifying malware infections and mitigating their impact, so this course could help you improve your business.

Infosec Institute

As the name says, the Infosec Institute focuses on helping cyber security and IT professionals keep the extra-fast pace of the field they work in.
The list of live courses if very appealing, as you can see from the sample below:

• Information Security
• Information Assurance
• IT Audit
• Microsoft
• Cisco
• 8570.1
• CompTIA
• Secure Coding
• Linux
• Project Management


I really hope that this list of cyber security online courses gives you a good starting point to finding exactly what you need to improve your knowledge and skills!

I could’ve certainly used it when I was doing my research.

Should you have any recommendations, please send them in a comment below and I’ll be happy to add them to the list!

In case you’re also looking for online courses, as well as certification options, I have a resource that you may find useful as well: this list of the Best Information Security Certifications for 2016 put together by Ed Tittel!

And if you’re new to MOOC (massive open online courses), then this article about Coursera, Udacity and edX will help you get a better picture of how you can explore them to your benefit.

Click here to Visit our Site