Available courses

Your computer can be accessed from any computer anywhere. This is how.

While group chat is a great resource, there are times when simply exchanging text with someone isn't enough. In addition, group chat is limited to coworkers and others who share your same domain.

That's where Alaric Support's Team Workspaces come into play. A Team Workspace includes real-time audio and video chat, inline Group Chat, and document sharing. NOTE: While any number of participants can be invited to a Team Workspace, audio and video chat is limited to up to 8 concurrent users.

A Alaric Support Workspace is a great way to gather people for an online meeting. You can start the workspace right from within the webmail client and then share your workspace link with whomever you want to attend: others in your office, remote workers or even someone outside of your organization. That's right: You can invite anyone to your workspace -- all they need is the workspace URL. There's no software to download, no services to sign up for and workspaces are both desktop and mobile friendly!


Scope of Compliance

The PCI requirements apply to all systems that store, process, or transmit cardholder data.  Currently, the Company’s cardholder environment consists only of limited payment applications (typically point-of-sale systems) connected to the internet, but does not include storage of cardholder data on any computer system. 

Due to the limited nature of the in-scope environment, this document is intended to meet the PCI requirements as defined in Self-Assessment Questionnaire (SAQ) C, version 3.2 revision 1.1, released January 2017.  Should the company implement additional acceptance channels, add additional connected systems, begin storing cardholder data in electronic format, or otherwise become ineligible to validate compliance under SAQ C, it will be the responsibility of the Company to determine the appropriate compliance criteria and implement additional policies and controls as needed.


Phishing is a form of social engineering where the defrauder attempts to fraudulently retrieve licit users’ sensitive information by imitating electronic communication from a trusted organization in an automated manner.

This course is to inform you of the processes and remediation an attack.


This policy applies to all Company employees, contractors, vendors and agents with a company-owned or personally-owned computer or workstation used to connect to the Company network. This policy applies to remote access connections used to do work on behalf of the Company, including reading or sending email and viewing intranet web resources.

 Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems.