Cyber Castle

Buzz Byteyear

What is a supply chain?

Gain a basic understanding of what a supply chain is in only 60 seconds.

Preventing supply chain fraud.

Learn about the steps to take to prevent supply chain fraud and understand the role you play at Bupa to help prevent it.

Software supply
chain attacks.

Learn how and why attackers are targeting the software supply chain to compromise organisations, and some of the way you can help minimise the risk related to these attacks.


Cyberella

Phishing decision tree.

Practical advice on the decisions you can make to help avoid phishing emails.


Captain Cyberhook

Phish Finder: Spotting warning signs (Beginner).

Suited to those with little to no knowledge of phishing, this video
will help you recognise some of the obvious signs of phishing attacks.

Phish Finder:
Spotting warning signs (Intermediate).

Suited to those with a basic knowledge of phishing, this video will help you recognise the more subtle warning signs of phishing attacks.

Phish Finder:
Spotting warning signs (Advanced).

Suited to those with an intermediate knowledge of phishing, this video will help you recognise the subtle warning signs of advanced, more sophisticated phishing attacks.


Elsa Encrypta

Data handling and security.

Learn about the foundational concepts related to data handling and security. You’ll learn how attackers actively attempt to gain access to personal and private information, and the role you play in protecting our customer, employee, and business information.

Securing data: Know your role.

Employees interact with data in different ways, and Bupa holds varying types of data - some of which is more sensitive than others. Cybercriminals often target people based on their access to important data. It's crucial that you recognise how to keep data secure and your role in protecting information.


Mal-wareficent

Preventing malware infections.

Attackers spread malware in many ways, including phishing emails, malicious documents, and lookalike websites, applications, and pop-up windows. This video reviews four tips to keep in mind to help you recognise and avoid malicious software.

The impacts of interacting with malware.

Interacting with malicious files poses a huge risk. But the degree of danger varies, depending on the type of malware. Learn how malware can be used against you, and how to recognise the dangers of interacting with malicious software.