Skip to main content

Cybersecurity - Teller Addendum

Updated this week

πŸ“˜ Cybersecurity for Tellers – Course Introduction

Step Type: Video

What learners will learn:
Learners will gain an overview of cybersecurity fundamentals, discover why cybersecurity is critical in financial institutions, and understand how to apply best practices in their daily work to protect customers and the organization.

Step Description:
This introductory video welcomes tellers to the Cybersecurity for Tellers course and sets the stage for what’s ahead. It explains how cybersecurity protects customers, branches, and the institution, and introduces core concepts, key regulations, and modern threats in the banking environment.

πŸ“˜ Spotting Phishing & Social Engineering at the Teller Window


​Step Type: Scenario
​What learners will learn: How to identify phishing, vishing, and QR/social engineering attempts at the branch and escalate safely.
​Step Description: Branch-realistic scenarios where tellers practice recognizing suspicious messages, customers presenting malicious QR codes, or fake IT calls, and follow correct escalation paths.
​Summary of Content: Social engineering tactics; red flags; teller responses; escalation and documentation.
​Key Topics Covered: Phishing; vishing; QR/social scams; red-flag recognition; escalation protocols.
​

πŸ“˜ Workstation & Screen Privacy for Tellers


​Step Type: MultiChoice
​What learners will learn: How to protect customer data on teller workstations through screen privacy, locking sessions, and clean-desk practices.
​Step Description: Practical exercises covering screen privacy, session locking, printer security, and shoulder-surfing scenarios.
​Summary of Content: Teller station controls; secure printing; handling visible NPI; physical workspace safeguards.
​Key Topics Covered: Screen locks; session timeouts; privacy filters; secure disposal; visitor proximity.
​

πŸ“˜ Passwords & MFA: Teller Essentials


​Step Type: Streak
​What learners will learn: How to create secure passwords, use multi-factor authentication (MFA), and recognize MFA-related attacks.
​Step Description: Q&A format testing password creation, MFA prompts, and safe practices (no sharing, no reuse).
​Summary of Content: Teller password hygiene; MFA awareness; avoidance of credential reuse; phishing-resistant MFA.
​Key Topics Covered: Unique credentials; MFA fatigue; safe handling of prompts; no credential sharing.
​

πŸ“˜ Customer Verification Before Discussing Account Details


​Step Type: Text
​What learners will learn: The importance of verifying identity before discussing or changing account access.
​Step Description: Provides verification scripts and escalation procedures for in-person and phone interactions.
​Summary of Content: ID verification methods; minimal disclosure rules; escalation when red flags appear.
​Key Topics Covered: Teller identity verification; customer authentication; disclosure minimization; escalation triggers.
​

πŸ“˜ Safe Handling of Files, Links, and USB Devices


​Step Type: MultiChoice
​What learners will learn: Teller do’s and don’ts for handling external media and suspicious links.
​Step Description: Exercises on evaluating USBs, attachments, and links presented by customers.
​Summary of Content: Media policies; link safety; reporting suspicious media; escalation chain.
​Key Topics Covered: USB bans; scanning protocols; email link safety; escalation.
​

πŸ“˜ Recognize & Escalate Cyber Incidents (Don’t Self-Fix)


​Step Type: Text
​What learners will learn: What counts as a cyber incident and how tellers must respond.
​Step Description: Playbook for recognizing, reporting, and documenting incidents without attempting self-remediation.
​Summary of Content: Incident indicators; first actions; reporting lines; documentation.
​Key Topics Covered: Incident response basics; escalation steps; evidence preservation.
​

πŸ“˜ Ransomware 101 for Frontline Staff


​Step Type: True or False
​What learners will learn: Recognize ransomware red flags and know immediate escalation steps.
​Step Description: Rapid-fire checks on ransomware myths and proper teller responses.
​Summary of Content: Indicators; isolation; no tampering; notify security immediately.
​Key Topics Covered: Ransomware red flags; teller escalation; prohibited actions.
​

πŸ“˜ Third-Party & Visitor Red Flags at the Branch


​Step Type: Scenario
​What learners will learn: How to identify and escalate suspicious vendor/visitor behaviors at the branch.
​Step Description: Scenarios where tellers respond to suspicious vendors, technicians, or courier behaviors.
​Summary of Content: Vendor/visitor access; badge verification; no unsupervised access; tailgating prevention.
​Key Topics Covered: Vendor access policies; verification; teller role in physical security.
​

πŸ“˜ Clean-Desk & Printed Data Hygiene at the Counter


​Step Type: MultiChoice
​What learners will learn: Prevent unauthorized disclosure through secure handling of printed materials.
​Step Description: Tests teller awareness of call-out etiquette, secure print handling, and shredding.
​Summary of Content: Clean-desk policies; printer security; proper disposal; customer data privacy.
​Key Topics Covered: Document security; shredding; print pickup; speech privacy.
​

Did this answer your question?