Free online learning for government employees.

The Hidden Dangers: A Guide to Mobile Security Threats
Mobile technology has changed how government employees work, and hackers have noticed. Mobile-specific threats are on the rise, with hackers often using mobile devices as a backdoor into the agency’s enterprise network. This video, based on a recent mobile threat report by Lookout, highlights four types of mobile threats that agencies need to be aware of, and offers tips for reducing risk.
Related Videos
Jun-02-2025
First responders and other government organizations in the field need trusted, uninterrupted access to information and communic...
A Single Solution: Secure Wireless Networks in the Field
May-28-2025
Every year, government loses billions of dollars to waste, fraud and abuse. Digital services are especially vulnerable, because...
Automated Identity Proofing Takes a Bite out of Waste, Fraud and Abuse
Apr-07-2025
Many federal agencies rely on outdated network infrastructure that is ill-equipped to handle the surge in bandwidth and securit...
How to Modernize the Network, Strengthen Security and Cut Costs
Mar-14-2025
Government agencies have a mandate to protect citizen data, but vulnerable code, faulty design and an insecure supply chain can...
The App Security Imperative: Closing the Cyber Gap
Jul-03-2024
Hybrid work has put state and local government agencies in a fix: They need to strengthen security for hybrid workers but not a...
Secure the Hybrid Workplace Without Compromising Performance
Mar-04-2024
As agencies embark on their journey to zero trust, they'll find no lack of tools to help them on their way. The problem is that...
Deploying Zero Trust Network Access to Drive Improved Cybersecurity
Jul-31-2023
Despite new technologies and new policies, cyber criminals continue to find ways to infiltrate government networks.
That’s why...
Next-Level Network Security: How to Detect Hidden Threats
Oct-26-2022
Yes, a zero trust-based approach to cybersecurity is complicated. And yes, you need to understand what it is and why it's impor...
Why Zero Trust? Why Now?
Aug-05-2022
Trying to figure out what exactly is in your cloud environment can be a bit like trying to get through a maze while blindfolded...
Best Practices for Hardening Cloud Security
Mar-31-2022
There's no getting around it: Malicious cyber actors see state and local agencies as prime targets -- both because they manage ...
All Aboard! 6 Stops on the Journey to Better Security
Jun-06-2025
Government employees make significant use of cell phones, tablets, laptops and other mobile endpoints that connect to agency ne...
How to Secure an Agency’s Many Mobile Devices
Jun-06-2025
Mobile devices such as cell phones, tablets and laptops may boost efficiency and make government employees more productive, but...
How to Tackle Your Mobile-Device Security Risks
Jan-21-2022
No one likes to think about it, but every time an employee uses a mobile device to access an agency's network, they might be op...
5 Steps for Stopping Mobile Threats Before Damage Is Done
Nov-24-2021
A mobile device can be a convenient and necessary communications tool as well as a missile heading for your critical data. Find...
Enabling Zero Trust for Your Mobile Devices
Sep-22-2021
Mobile security means more than device security. In fact, one of the biggest vulnerabilities is often overlooked: App security....