NetDefense Pro - Cybersecurity Awareness Training

(407) 532-4865




Get Protected Now: Call (407) 532-4865

Submitting Form...

The server encountered an error.

Form received.

Submitting Form...

The server encountered an error.

Form received.

Get Protected Now

Call (407) 532-4865

  • Isn’t my antivirus software enough to keep my business safe?

    While standard antivirus can protect individual computers from things like malware, it will not protect against a breach caused by your employees. And one breach could bring down your entire network or cause you to lose company data or your clients’ data!

  • Why should I subscribe to NetDefense Pro?

    The NetDefense Pro program was designed by a team of cyber security experts and instructional designers.


    The benefits of the subscription are:

    • Startup course – 7 highly interactive self-paced learning modules to get your employees an initial certificate.
    • Knowledge checks to ensure your employees understand the content and to earn a certificate
    • Continuous monthly micro-learning modules, tailored to the technology your employees actually use, covering Windows, Mac, iPhones, iPad or Android devices.
    • Phishing scam tests are sent to your employees randomly to make sure they continue to work safe.
    • Reward program so your employees are continually motivated to complete the training and keep your business NetDefense Pro.
  • What is the cloud and why is it a potential risk?

    Many companies use cloud services to store their files outside of the company’s network. Using the cloud also allows employees working remotely to access files when they aren’t in the office. One of the biggest risks in the cloud is that someone else is controlling your data. Most people think all the information they upload is secured by encryption, but sometimes it is not, and anyone at the cloud storage company – or who breaches the cloud storage security - can access it. Additionally, because cloud computing is still relatively new, hackers see it as a way to test their skills to try to break into cloud servers and compromise data stored in them.

  • Why do we need cybersecurity training for employees?

    Employees result in 80% of all cybersecurity issues.

  • What is Phishing?

    Phishing is an attempt to gain personal information from an individual by pretending to be a reputable organization. Most often this occurs though email but sometimes through text messaging as well. A person may receive an email from someone pretending to be from the bank for example, suggesting the account has been fraudulently accessed and asking to verify the account details with you to protect your account. When you verify the account details you provide personal information which the phisher uses to further compromise your security.


  • What causes virus infections at small businesses?

    Most occur through email attachments from non-reputable sources, or from unsafe and uneducated browsing habits. The best defense against these attacks is employee education.

  • Should I be worried about ransomware?

    Yes! Ransomware data mines information from your network, encrypts your data, and then demands a fee is paid to release your data. You are then locked out of your data until you pay their fee for release.

  • Are mobile devices a real threat to my small business?

    Yes, mobile devices can attempt to connect to any wifi internet connection available, and unsafe browsing or downloads on one device can infect the network it attaches to, including the company network.

  • Why would someone be interested in attacking my small business?

    Unlike larger enterprises that have more formal safeguards against cyber attacks, hackers know that small and medium sized companies often lack these resources, so you are an easy target! What are they interested in? If they do a ransomware attack, they can encrypt and lock you out of your own servers until you pay a ransom. Or, they can steal your intellectual property or steal any customer data you may have on your servers.

  • Does my small business actually contain Intellectual Property that is at risk from a cyberattack?

    Yes. In terms of intellectual property most at risk from cyberattacks, your trade secrets are the most vulnerable. Your business’s trade secrets include software programs, customer lists, manufacturing processes, recipes, data models, vendor contracts, new product development communications and research information. The list can go on and on. Anything that gives your business a competitive advantage that can’t be trademarked, copyrighted or patented, but must remain secret to ensure your company keeps its competitive advantage in the marketplace, could be a trade secret.

  • What is a social engineering attack? And should I be worried?

    When someone plays the part of a person of authority at your organization to obtain sensitive information from someone at your company, this is a social engineering attack. For example, a person claiming to be the CEO calls IT and asks for a password reset. The IT person complies believing they are speaking to the CEO, and resets the password to the outsider’s request. That person then gains access to the company network. If your employees aren’t trained in how to handle these requests and a policy isn’t in place for protection from these attackers, a data breach can occur.

  • What are the points and how does the redemption program work?

    Employees earn points for completing learning milestones in NetDefense Pro. Points are earned for completing the Startup course learning modules, as well as the employee’s monthly alert updates. Employees also earn points each time they are able to identify and avoid our phishing scam emails. Employees can redeem the points at any time in the learning portal, through the Profile section for a Tango Card®. Tango Cards can be redeemed for iTunes®,, Starbucks, or your favorite gift card. Use online, in store, or on your mobile. *Tango Card is not a sponsor of the rewards or otherwise affiliated with NetDefense Pro. The logos and other identifying marks attached are trademarks of and owned by each represented company and/or its affiliates. Please visit each company’s website for additional terms and conditions.

Submitting Form...

The server encountered an error.

Form received.

Get Protected Now:

Call (407) 532-4865