How to identify confidential, restricted, and public data
Where and how to store sensitive data securely
Common mistakes and how to avoid them
How to secure your home office setup
Secure use of Zoom, Teams, and cloud tools
Practical tips to avoid remote phishing attacks
Secure email and chat practices
Signs of social engineering in communication
Proper ways to share documents and links