Security Awareness Service trains your employees using realistic spear phishing simulations and AI-powered e-training, heightening awareness of cyber security risks and threats. Employees learn effectively on how to protect themselves and your company. Fully automatic and easy to use.
SECURITY AWARENESS SERVICE
OVERVIEW OF LEARNING CONTENT
Interactive e-learning that is motivating and fun
E-tutorials convey key content on various aspects of IT security in a way which is easy to understand, entertaining and brings the topics to life. The focus is on content that is instantly relatable to every- day life, even for non-experts, and can be put into practice directly. One to three learning modules are available for each topic, comprising of interactive e-tutorials, video clips or PDFs. There are also refresher modules to help participants recall content they have covered previously.
- Interactive e-tutorials – Are broken down into multiple modules of 2 to 10 minutes each. Progress is saved, allowing participants to complete each module in one or several sittings.
- Short Videos – The 60 to 90-second video clips aim to motivate learners, heighten their awareness of specific information on security challenges, as well as recap or consolidate individual learning objectives.
- PDF / Documents – Our PDFs contain information to accompany the e-tutorials and can be saved or printed out by your employees for quick access.
- Refresher Modules – To help your employees refresh their knowledge, we also offer refresher modules that provide a clear summary of the content already covered.
Monitoring also plays a key role. Training can be managed and learning progress is tracked in the Security Hub.
Through the Security Hub, participants who have successfully completed the e-tutorials modules assigned to them, can also obtain a personalized participation certificate, which can be used as proof under ISO 270 01.
Overview of E-Tutorials
No | Name | Format |
1 | IT and me: My contribution to security | E-Training |
2 | Social Engineering | E-Training |
3 | Email Security | E-Training |
4 | Passwords and authentication | E-Training |
5 | Social Media | E-Training |
6 | Vishing | E-Training |
7 | Staying secure while working from home | E-Training |
8 | Setting an example for information security as manager | Video |
9 | Data protection | E-Training |
10 | Dangerious Macros – Emotet and Macrovirus Pandemic | Video |
11 | Don’r swallow the bait – fake login pages | Video |
12.1 | Information protection classes | E-Training |
12.2 | How to properly protect inoformation | |
13.1 | Report IT security incidents | E-Training |
13.2 | Detect IT security incidents | |
13.3 | IT emergency card | |
14.1 | Security when working mobile | E-Training |
14.2 | BYOD and mobile devise security | |
15.1 | Staying secure on the internet | E-Training |
15.2 | Dangerous websites – protecting systems against attacks | |
16 | The reporter button – one-click decision support | Video |
17 | Vishing | Refresher module |
18 | Phishing | Refresher module |
19 | Social Media | Refresher module |
20 | Staying secure working from home | Refresher module |
21 | Secure handling of passwords and access data | Refresher module |
22 | Smishing | E-Training |
223 | Phishing emails and mobile devises | E-Training |
24 | Clean Desk Policy | E-Training |
25 | IoT – Benefits & Dangers | E-Training |
26 | USB Drop Attacks | E-Training |
27 | Shoulder Surfing | E-Training |
28 | Gift Card Scams | E-Training |
29 | Adware & Malvertising | E-Training |
30 | Security in Online Meetings | E-Training |
31 | Bots & Botnets | E-Training |
The Awareness Engine is the technological heart of our Security Awareness Service and offers the right amount of training for every individual.
Every user receives as much training as needed and no more than required.
- Needs-based provision of relevant e-training content
- Booster option for users requiring more intensive e-training
- Fully automatic management of e-training
PATENTED SPEAR PHISHING ENGINE
- Realistic, individually customized spear phishing simulations of differing degrees of severity – so that employees can detect even the most sophisticated of attacks.
- State-of-the-art phishing scenarios also lead to bogus login pages, contain file attachments with macros, and e-mails with response threads.
Awareness Engine
- Auto Training Mode: Learning content is automatically rolled out to users and groups on demand. Single User & Productivity Booster: Users with additional learning needs are trained more intensively; users at a very good security level, on the other hand, are trained less.
- Automatic onboarding of new users (requires LDAP/AD Sync.)
- Manual Training Mode: There is an option to manually roll out training modules to the groups and users
Manual Training Mode: There is an option to manually roll out training modules to the groups and users
Cybersecurity Solutions for you
SMBs Are Being Targeted for Cyberattacks
Don’t let yours be next.
When you’re running a small to medium-sized business, you may think that you’re not going to become a victim of a cyberattack. Maybe you think that your data and files aren’t valuable enough to be stolen—or even worse, that your current cybersecurity strategy is strong enough to protect them. But nothing could be farther from the truth. In fact, cybercriminals are becoming smarter every day, and since their methods are constantly changing, your security needs will also need to evolve. To stay safe, adopt a comprehensive cybersecurity solution that protects your entire organization.
Basic Cyber Insurance insists that all staff receive training on recognizing and mitigating phishing threats. This exam focuses on enhancing awareness, helping to reduce the likelihood of falling victim to cyber attacks, This is a requirement for minimizing associated insurance claims and risks.
CYBER SECURITY AWARENESS
This is ongoing education that encompasses various aspects of IT security, not just email security. It can be utilized independently or in conjunction with other services. The training content, including phishing simulations, is adaptable, and delivery timing is personalized. It offers visibility into individual user training data
OFFICE 365
Specialized program offering comprehensive education on Microsoft 365 applications and features. Tailored for enhanced productivity and security, this training equips users with the skills to maximize the potential of Microsoft 365 in a cloud-based environment.
AZURE
Azure training is a specialized program focused on Microsoft Azure cloud services. This comprehensive training equips participants with the knowledge and skills needed to effectively utilize Azure services, enhancing proficiency in cloud computing, infrastructure management, and application. deployment.
Specialized program designed to educate individuals and organizations on the General Data Protection Regulation (GDPR). This training ensures a comprehensive understanding of GDPR principles, compliance requirements, and best practices for data protection in the digital landscape.
SHAREPOINT
SharePoint training is tailored for users seeking expertise in Microsoft SharePoint. This comprehensive training equips participants with the knowledge and skills necessary for effective collaboration, content management, and customization within the SharePoint platform in a cloud-based environment.