Module 1 of 3
Prepared for Southeastern Pneumatic
Getting started
Security Awareness Training

Cybersecurity 101

Why cybersecurity matters and the role every employee plays in keeping Southeastern Pneumatic safe.

~10 minutes

Why This Training Matters

Cybersecurity attacks target businesses of every size. Southeastern Pneumatic handles sensitive employee data, financial transactions, and vendor communications every day. That makes us a target.

Attackers don't always use sophisticated technology. More often, they trick people into making mistakes: clicking a fake link, sharing a password, or trusting a phone call they shouldn't. This training will show you how to recognize those tricks.

Training overviewThis program has three modules, each about 10 minutes. Every module ends with a short quiz. You need 80% to pass each one.

The Numbers

These figures come from real breach investigations analyzed in the 2025 Verizon Data Breach Investigations Report, one of the most comprehensive cybersecurity studies published each year.

0%
of breaches involve
a human element
Verizon DBIR 2025
0%
of breaches start with
stolen credentials
Verizon DBIR 2025
0%
of breaches involved
ransomware
Verizon DBIR 2025
0%
involved a
third-party compromise
Verizon DBIR 2025

The pattern is clear: most attacks start with people, not technology. That's why training matters.

This has happened hereSoutheastern Pneumatic has experienced business email compromise attacks. A partner's email account was taken over by attackers and used to send convincing fake messages to our employees. These are real threats, not hypothetical ones.

You Are the Human Firewall

A firewall is a system that blocks threats from entering a network. You are the human version.

When you pause before clicking a link, verify an unexpected request, or report something suspicious, you stop attacks that technology alone cannot catch. Attackers succeed when people act without thinking. They fail when people slow down.

Three habits that stop attacks

  • Pause before clicking or responding to unexpected messages. If something feels urgent or unusual, that's your cue to slow down, not speed up.
  • Verify unusual requests through a separate, trusted channel. If someone emails asking for something out of the ordinary, call them on a number you already know.
  • Report anything suspicious to your manager, even if you're not sure. It's always better to report a false alarm than to ignore a real threat.
You don't need to be a tech expertYou just need to stay alert and follow the practices covered in this training. Every time you spot something suspicious and say something, you're protecting yourself, your coworkers, and the company.

What You'll Learn Next

After this quiz, you'll continue with two more modules. Each one covers real scenarios relevant to your daily work.

2
Phishing & Suspicious Messages
How to spot fake emails, text messages, and phone calls designed to steal your information or credentials.
3
Passwords & Account Security
How to create strong passwords, protect your accounts, and respond if you think something has been compromised.
Ready?Let's start with a quick knowledge check on what you've learned so far.

Knowledge Check

Answer all 5 questions based on what you just read.

Passing score: 80% (4 out of 5)
Question 1 of 5
According to the 2025 Verizon Data Breach Investigations Report, approximately what percentage of cybersecurity breaches involve a human element?
Question 2 of 5
Which of the following is the most common way attackers initially gain access to an organization?
Question 3 of 5
What does it mean to be a "human firewall"?
Question 4 of 5
Southeastern Pneumatic has previously experienced which type of real-world cybersecurity incident?
Question 5 of 5
Which statement about cybersecurity responsibility is correct?