(2025-06) New targeted security training for Finance Teams, HR & People Teams, Insider Threats and more

To make security training more meaningful and effective, Hoxhunt now offers targeted content tailored to detecting and reporting Insider Threats and three new role-base training topics: Finance Teams, HR & People Teams, and the EU AI Act.

Whether it’s the subtle warning signs of a malicious insider, a malicious file hidden in a job application, or the pressure tactics targeting a finance professional during quarter-end close, these modules offer clear, practical guidance grounded in real-world risk.

New role-based training content

Finance Teams

  • What is invoice fraud?

  • Business Email Compromise (BEC)

  • Your 9-step checklist for spotting invoice fraud

  • Spotting fraudulent payment details

  • Service impersonation

  • Pressure tactics in finance fraud

HR & People Teams

  • Introduction to cybersecurity for HR and People Teams (video)

  • Recognizing HR specific threats (video)

  • Impersonation and pressure

  • Handling sensitive data with care

  • Secure onboarding & offboarding 

  • Handling sensitive topics securely 

  • Red flags in job applications
  • Creating a culture where people ask first and act second

Cybersecurity for Executives

  • Whaling

EU AI Act

  • A risk-based approach to AI (Legal Teams)
  • What is an AI system according to the EU AI Act? (Legal Teams)

New general content

Insider Threats

  • What is an insider threat?

  • Signs of insider threats

  • Reporting insider threats

  • Insider threats for managers

Privacy

  • Data handling and labeling 

Device Security

  • Shadow IT
  • User-Developed Applications (UDAs)
  • Lost device (video)

Passwords

  • Do not share your passwords (video)
  • Protect your accounts (video)

Social Engineering

  • Understanding money transfer fraud (video)
  • Vishing (voice + phishing) (video)
  • Hovering on links (video)

Physical Security

  • Badge policy (video)
  • Keeping premises safe (video)

Malware

  • Common sources of malware (video)

Social Media & Personal Email

  • Securing social media accounts (video)
  • Sharing in social media best practices (video)

Browsing Internet Securely 

  • Keeping your browser updated (video)

Actions needed from you 

No action is required from you.

If a topic is inactive by default and you want to activate it along with its modules, toggle it to active in the admin SAT library next to the topic name.

Related Articles

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request