Security Awareness

security awareness training

Cybercriminals target end users. Ongoing cybersecurity education and training for end users is a must for businesses to stay secure.

Problem

Cybercriminals target businesses through their end users, often using user information as shared on social networks and other locations online to gain their trust. When end users unwittingly click phishing links, open malware attachments, or give up credentials and other sensitive information online, cybercriminals can bypass existing layers of security to successfully breach organizations’ networks.

90% of successful network breaches were caused by user error* *2017 Verizon Data Breach Report

Solution

With ongoing, relevant, engaging cybersecurity awareness training-such as phishing simulations, courses on IT and security best practices, and data protection and compliance training where relevant-businesses can significantly reduce the risks they face due to user error. Webroot Security Awareness Training ensures that people, processes, and technology are all harnessed effectively together to stop cybercriminals.

Global, real-time Webroot® Threat Intelligence helps provide highly topical, relevant, and timely real-life educational content. Our integrated online security management console and automated Learning Management System make administration straightforward and easy, helping organizations reduce risk, decrease infections and related help desk costs, protect their reputation by experiencing fewer breaches, and secure their overall cybersecurity investment.

Why we're different

Proven efficacy

User error accounts for up to 90% of successful breaches. With computer-based training, you can significantly change the odds.

Ongoing defense

Ongoing user training ensures your clients are kept up to date on the latest methods of attack, so they stay on track and out of the headlines.

Regulatory compliance

Protect users and data, avoid fines, and ensure compliance with SEC, FINRA, PCI, HIPAA, GDPR, and other regulations.

Easy 5-step setup wizard and LMS

Our learning management system lets you launch effective education programs in minutes. You can also schedule training and reports to run automatically.

A fully featured phishing simulator

Launching realistic phishing simulations lets you accurately monitor real-world user responses, then direct awareness programs to users accordingly.

Engaging, interactive courses

Succinct, easily-consumed, interactive courses increase end users’ attentiveness, as well as the overall effectiveness of cybersecurity education programs.

Trackable, customizable campaigns

Measuring individual and overall success is key. The LMS keeps track of user participation, making all education accountable and measureable.

Campaign and contact management

Our campaign management wizard, contact manager, email templates, course library, and reporting center let you schedule and assign training efficiently.

Campaign and contact management

Our campaign management wizard, contact manager, email templates, course library, and reporting center let you schedule and assign training efficiently.

Courses

Our courses are specifically designed to help you address unwitting user error to enhance your business' and clients' security posture and meet compliance regulations.

Understanding Cybersecurity

Course Information: Description: Best practices every end-user and employee should know to help reduce risk of malware infection and company breach. Usage: Annual and new-hire security awareness training. Topics: Internet and email best practices Keeping a clean machine Password management Phishing & social engineering Signs of a cybersecurity breach Interactive quiz (8 questions)

Understanding Phishing

Course Information: Description: Comprehensive phishing course with an overview of different types of phishing attacks, the risks phishing poses to users and companies, as well as best practices to avoid falling for a phishing attack. Includes real-world scenarios and examples. Topics: Categories of phishing Risks associated with phishing Best practices to stay safe Full and abbreviated versions Varying knowledge check questions

PCI DSS

Course Information: Description: This course will help you understand the basics of the PCI security standards and how to put the knowledge into practice while at work. Topics: What is PCI DSS and who needs to comply? Terminology, responsibilities and standards Vulnerabilities and risks to payment card data Security best practices when taking payments Interactive quiz (8 questions)

Phishing Awareness

Course Information: Description: A short course on email, phone, and website phishing. Recommended usage: Monthly, bi-monthly, or as needed. Topics: Risks involving email phishing Risks involving social engineering Common techniques How to spot phishing attempts Quiz: 4 interactive questions

Websites and Software

Course Information: Description: A short course on the danger of installing unauthorized software. Recommended usage: Monthly or bi-monthly. Topics: Website browsing best practices Risks involving malicious websites Software management best practices Risks involving malicious software Detecting and avoiding malicious websites Quiz: 4 interactive questions

GDPR – General Data Protection Regulation (UK/EU)

Course Information: Description: This course helps employees understand GDPR requirements that apply to any company that processes EU citizen data within or outside the EU along with best practices to help meet the new regulations. Usage: GDPR awareness training course Topics: Definitions and new requirements Data protection principles Data breach and subject rights Governance and accountability Key tasks and new concepts

Physical Access

Course Information: Description: A short course on how to properly secure work areas and computers. Recommended usage: Monthly or bi-monthly. Topics: Physical access best practices Clean desk principles Quiz: 4 interactive questions

Understanding Malware

Course Information: Description: This course gives end users a basic understanding of malware risks. Recommended usage: As needed. Topics: Types of malware Polymorphic malware Infection scenario Quiz: 3 interactive questions

Whistleblowing

Course Information: Description: A UK compliance course that includes an overview of whistleblowing, why it is important, and how you are protected under UK law. Topics: What whistleblowing is Your protections under UK law The process of whistleblowing Who to turn to for support 7 knowledge check questions

Global Privacy and Data Protection

Course Information: Description: Privacy awareness for the workforce of global organizations. Focuses on key concepts around privacy that are common across international jurisdictions including GDPR. Topics: What counts as personal data Why we protect personal data Data collection, handling, and processing Updated for GDPR 10 knowledge check questions

Social Media Awareness

Course Information: Description: Overview of social media and risks around usage at work. Usage: For topical tips and training. Topics: Social media overview Common sense usage of social media Personal vs corporate use of social media Introduction to a corporate social media Policy Interactive quiz (8 questions)

Introduction to Ransomware

Course Information: Description: This course helps you gain a comprehensive understanding of ransomware, encryption, and cybersecurity. You’ll learn how to keep your information safe and how to help prevent future attacks. Usage: Topical course and cybersecurity reinforcement. Topics: Intro to cybersecurity Intro to encryption Attack prevention and data protection

HIPAA for CE or BA

Course Information: Description: Two comprehensive training courses for HIPAA Covered Entities (CE) or HIPAA Business Associates (BA). Recommended usage: Annual. Topics: Health privacy overview What is PHI? Confidentiality requirements Minimum necessary rule Disclosures Personal Rights Compliance Logs Authorization Enforcement Quiz: 10 interactive questions

Anti-Money Laundering

Course Information: Description: An awareness course on money laundering, what it is, why it's illegal, and how to recognize it. Topics: What counts as money laundering Why money laundering is illegal Different stages of money laundering 4 knowledge check questions

Email

Course Information: Description: A short course on the risks of email phishing. Recommended usage: Monthly, bi-monthly, or as needed. Topics: Email best practices Risks around email phishing Safe habits Quiz: 4 interactive questions

Passwords

Course Information: Description: A short course on password best practices. Recommended usage: Monthly or bi-monthly. Topics: Password best practices The importance of strong, unique passwords Risks involving poor password management Quiz: 4 interactive questions

Bribery Act

Course Information: Description: A compliance course focused on the UK-based Bribery Act of 2010. Topics: An overview of the Bribery Act Myths and facts around bribery Your responsibilities under the Act 4 knowledge check questions

Freedom of Information Act

Course Information: Description: A compliance course focused on the UK-based Freedom of Information Act. Topics: An overview of the Freedom of Information Act FOIA and your organization What is and isn't covered by FOIA 10 knowledge check questions

Working Safely and Securely

Course Information: Description: Keeping your work community safe and secure. Topics: Security policy and procedures Physical security overview Visitor security best practices Interactive quiz (6 questions)

Avoid Phishers, Hackers and Social Engineers

Course Information: Description: This course covers essential topics necessary to meet an organization’s annual security awareness requirement. Recommended usage: Annual. Topics: Risks involving social engineering Risks involving phishing Risks involving malicious websites and software Quiz: 8 interactive questions

GDPR Express

Course Information: Description: This condensed version of the full GDPR course gives an overview of the new General Data Protection Regulation and its impact on organizations that store or process EU citizen personal data, raising employee awareness around these new requirements. Usage: Introductory or refresher course to GDPR. Topics: Overview of GDPR Who must comply Supervisory authorities Collecting, processing, and securing personal data

Ransomware, Acts and Obligations

Course Information: Description: This course reviews the different types of ransomware—including scareware, screen lockers, and encrypting ransomware—as well as the laws against them and the steps you should take to prevent an attack. Usage: Use as a topical course and cybersecurity reinforcement. Topics: Ransomware types explained Importance of backups and keeping data safe Best practices for working remotely

Ransomware and Cybercrime

Course Information: Description: A look at how cybercriminals use ransomware to profit from individuals, businesses, hospitals, governments, and more, this course reviews the 2017 WannaCry attack to help you better protect your systems and sensitive data from future attacks. Usage: Topical course and cybersecurity reinforcement. Topics: Explanation of cybercrime Review of 2017 WannaCry attack How to avoid becoming a cybercrime victim

error: