Knowledge Base

Training: CUI

Training: CUI

This module contains training on CUI 

...
Read More
Training: Insider Threat

Training: Insider Threat

This module contains training lesson on insider threat

...
Read More
Video & Document: IT Policy

Video & Document: IT Policy

Navigating IT Basics: Your Essential Guide to IT Policies.
In this informative video and document, we demystify the world of IT policies, making them accessible to both tech novices and enthusiasts. View the attached video to make sure you are aware of them. Step into the digital realm of s...

Read More
Document: Third Party Security Awareness Standard

Document: Third Party Security Awareness Standard

This document presents the Third-Party Security Awareness Standard, which outlines the security measures and guidelines that third-party vendors, partners, and contractors must adhere to when handling sensitive information or accessing our systems. Ensuring the security of our organization's data...

Read More
Video: Physical Security

Video: Physical Security

Securing the Digital Fort - Physical Security Against Cyber Threats: In this eye-opening video, we explore the crucial intersection of physical security and cyber threats within the realm of technical organizations. Join us as we uncover how robust physical security measures play a vital role in ...

Read More
Video: Password Security

Video: Password Security

Mastering Password Security, Your First Line of Digital Defense: In this enlightening video, we unravel the vital importance of password security in today's interconnected world. Discover the compelling reasons why we need strong passwords to fortify your digital presence against cyber threats...
Read More
Video: Phishing Attack

Video: Phishing Attack

Unmask Phishing Attacks & Defend Against Deceptive Threats: In this insightful video, we delve into the world of phishing attacks, a cunning tactic used by cybercriminals to trick individuals and organizations. Join us as we uncover the anatomy of phishing attacks, learn to recognize red flag...

Read More
Video: Report Security Incidents

Video: Report Security Incidents

The Power of Incident Reporting and Safeguarding IT Excellence: In this enlightening video, we uncover the critical importance of incident reporting within the IT department. Listen as we delve into the reasons why promptly reporting incidents is a cornerstone of maintaining a secure and efficien...

Read More
Document: Cyber Security Policy

Document: Cyber Security Policy

The uploaded cybersecurity policy document is a comprehensive guide developed by TSCTI to establish a robust framework for safeguarding our digital assets and sensitive information from cyber threats. It outlines the principles and procedures that everyone within our organization must follow to m...

Read More

Reach out at our centralized support system

Contact us OR Create a ticket, we’ll get back to you as soon as possible.

Contact Us @ +1 205-453-7667
Submit ticket