π Cybersecurity for Tellers β Course Introduction
Step Type: Video
What learners will learn:
Learners will gain an overview of cybersecurity fundamentals, discover why cybersecurity is critical in financial institutions, and understand how to apply best practices in their daily work to protect customers and the organization.
Step Description:
This introductory video welcomes tellers to the Cybersecurity for Tellers course and sets the stage for whatβs ahead. It explains how cybersecurity protects customers, branches, and the institution, and introduces core concepts, key regulations, and modern threats in the banking environment.
π Spotting Phishing & Social Engineering at the Teller Window
βStep Type: Scenario
βWhat learners will learn: How to identify phishing, vishing, and QR/social engineering attempts at the branch and escalate safely.
βStep Description: Branch-realistic scenarios where tellers practice recognizing suspicious messages, customers presenting malicious QR codes, or fake IT calls, and follow correct escalation paths.
βSummary of Content: Social engineering tactics; red flags; teller responses; escalation and documentation.
βKey Topics Covered: Phishing; vishing; QR/social scams; red-flag recognition; escalation protocols.
β
π Workstation & Screen Privacy for Tellers
βStep Type: MultiChoice
βWhat learners will learn: How to protect customer data on teller workstations through screen privacy, locking sessions, and clean-desk practices.
βStep Description: Practical exercises covering screen privacy, session locking, printer security, and shoulder-surfing scenarios.
βSummary of Content: Teller station controls; secure printing; handling visible NPI; physical workspace safeguards.
βKey Topics Covered: Screen locks; session timeouts; privacy filters; secure disposal; visitor proximity.
β
π Passwords & MFA: Teller Essentials
βStep Type: Streak
βWhat learners will learn: How to create secure passwords, use multi-factor authentication (MFA), and recognize MFA-related attacks.
βStep Description: Q&A format testing password creation, MFA prompts, and safe practices (no sharing, no reuse).
βSummary of Content: Teller password hygiene; MFA awareness; avoidance of credential reuse; phishing-resistant MFA.
βKey Topics Covered: Unique credentials; MFA fatigue; safe handling of prompts; no credential sharing.
β
π Customer Verification Before Discussing Account Details
βStep Type: Text
βWhat learners will learn: The importance of verifying identity before discussing or changing account access.
βStep Description: Provides verification scripts and escalation procedures for in-person and phone interactions.
βSummary of Content: ID verification methods; minimal disclosure rules; escalation when red flags appear.
βKey Topics Covered: Teller identity verification; customer authentication; disclosure minimization; escalation triggers.
β
π Safe Handling of Files, Links, and USB Devices
βStep Type: MultiChoice
βWhat learners will learn: Teller doβs and donβts for handling external media and suspicious links.
βStep Description: Exercises on evaluating USBs, attachments, and links presented by customers.
βSummary of Content: Media policies; link safety; reporting suspicious media; escalation chain.
βKey Topics Covered: USB bans; scanning protocols; email link safety; escalation.
β
π Recognize & Escalate Cyber Incidents (Donβt Self-Fix)
βStep Type: Text
βWhat learners will learn: What counts as a cyber incident and how tellers must respond.
βStep Description: Playbook for recognizing, reporting, and documenting incidents without attempting self-remediation.
βSummary of Content: Incident indicators; first actions; reporting lines; documentation.
βKey Topics Covered: Incident response basics; escalation steps; evidence preservation.
β
π Ransomware 101 for Frontline Staff
βStep Type: True or False
βWhat learners will learn: Recognize ransomware red flags and know immediate escalation steps.
βStep Description: Rapid-fire checks on ransomware myths and proper teller responses.
βSummary of Content: Indicators; isolation; no tampering; notify security immediately.
βKey Topics Covered: Ransomware red flags; teller escalation; prohibited actions.
β
π Third-Party & Visitor Red Flags at the Branch
βStep Type: Scenario
βWhat learners will learn: How to identify and escalate suspicious vendor/visitor behaviors at the branch.
βStep Description: Scenarios where tellers respond to suspicious vendors, technicians, or courier behaviors.
βSummary of Content: Vendor/visitor access; badge verification; no unsupervised access; tailgating prevention.
βKey Topics Covered: Vendor access policies; verification; teller role in physical security.
β
π Clean-Desk & Printed Data Hygiene at the Counter
βStep Type: MultiChoice
βWhat learners will learn: Prevent unauthorized disclosure through secure handling of printed materials.
βStep Description: Tests teller awareness of call-out etiquette, secure print handling, and shredding.
βSummary of Content: Clean-desk policies; printer security; proper disposal; customer data privacy.
βKey Topics Covered: Document security; shredding; print pickup; speech privacy.
β
