Training that’s different, and makes a difference
Boring, pedantic, burdensome training can cause people to tune out cybersecurity as “not my problem.” People can’t grasp what they need to know, so they don’t apply it. And then they resist further training.
With KnowCyber’s programs, your people learn more, faster. They retain what they learn and enjoy putting it to work. They want to learn more.
- We embrace today’s learning styles and preferences. Quick, micro-learning modules. Compelling narratives. Meaningful interactivity. Clear objectives. Expertly structured content.
- We develop essential skills as well as knowledge. Practical, how-to training. Focused on today’s critical cyber threats and best defenses.
- We address how busy people want to learn, and learn best. Seamless delivery, on demand, to the devices your learners want to use—phone, tablet, and desktop.
Security Awareness Now!™
Our core series of practical, high-impact online training modules
Phishing . . . smishing . . . malware exploits . . . social engineering . . .
More and more, cyber attackers use such techniques to target users—people—rather than attack an organization’s networks and systems directly. Too often, they succeed.
But your people shouldn’t be your organization’s weakest link when it comes to cybersecurity. They can, in fact, be your greatest resource . . . if they are aware, knowledgeable, and motivated . . . when they are prepared to think and act effectively.
Our Security Awareness Now!™ suite of video-based micro-learning modules—gives your employees the competence they need to act as your organization’s first line of cyber defense.
ON-LINE AND MOBILE-OPTIMIZED LEARNING . . . ANYTIME, ANYWHERE, ON ANY DEVICE
- INFUSION PLAN Deploy the entire suite of 15 modules, one every 2 to 4 weeks, to keep employees alert to threats and mindful of their behaviors.
- SERIES BY SERIES Assign clusters of modules to address your top concerns.
- CUSTOMIZED APPROACH Ask us to custom brand, augment, or tailor any module or set of modules.
Security Awareness Now!™ Modules
A Tale of Two BreachesCybersecurity threats come from many directions, and even innocuous incidents can have far-reaching repercussions. This module traces the origins and implications of two large data breaches. Learners see how seemingly innocuous individual actions can be critically important to an organization’s cybersecurity. They begin acquiring specific steps for improving their security consciousness and preparedness.
Using Email SecurelyAs email connects employees with the outside world, it presents one of the biggest opportunities to gain unauthorized access to enterprise systems. This module explores email vulnerabilities, teaches email best practices, and prescribes what to do when email is hacked or compromised.
PhishingPhishing is aptly named because it uses bait to dupe unsuspecting victims into providing access to enterprise systems. In this module, employees learn how to spot phishing scams, avoid taking the bait, ensure that their devices are protected, and deal with phishing emails they receive.
Password SecurityPasswords provide access. Poor password construction and hygiene account for more cybersecurity breaches than any other factor. This module motivates learners to take password security seriously. It enables them to create strong passwords and practice effective password management.
Phishing PlusWorkplace-related phishing scams have become more sophisticated and targeted. This module builds on our Phishing module—increasing employees’ insight into scammers’ psychological ploys, their ability to recognize the telltale signs of phishing, and their skill at thwarting spear phishing, business email compromise, and whaling attacks.
Creating Strong PasswordsMost passwords in use today are completely ineffective—either too common, short, and easy to crack or impossible to remember. This module augments our Password Security module. It dissuades learners from using overworked password strategies that can easily be hacked and demonstrates how to come up with strong passwords they can actually remember!
Vishing & SmishingAll employees are increasingly vulnerable to non-email-based phishing attacks in the form of vishing (voice-based phishing) phone calls and smishing (SMS, or “short message service”) text messages. This module dispels common misconceptions as it prepares learners to recognize and thwart these types of attacks.
Password Management & AuthenticationMost users have unique passwords for 25+ active accounts—a lot of passwords to manage! This module emphasizes the pitfalls of ineffective password management and surveys the advantages and available features of password management software. It also prepares learners to choose identity-authentication questions and answers that won’t be easily hacked.
Mobile Device SecurityMobile devices—phones and tablets—are increasingly our preferred way to connect with the on-line world and, accordingly, increasingly a preferred target of hackers. This module alerts employees to key vulnerabilities and demonstrates how to know whether a device has been compromised. Employees learn specific techniques for keeping devices secure.
Wireless Network SecurityWireless networks afford unprecedented opportunity to maintain online presence and boost work productivity. They also invite unprecedented security vulnerability, as many public wireless networks lack even the most fundamental security measures. In this module, learners explore the potential threats and learn how to protect themselves and their organizations.
Social EngineeringSocial engineering refers to efforts to turn the most basic elements of human nature against people so as to gain unauthorized access to data and systems. This module demonstrates how social engineers use human psychology to create relationships that become stepping stones to cybersecurity breaches. It prepares employees to both recognize and resist social engineering exploits.
Protecting Against MalwareInfecting devices with malicious software —malware or spyware—is one of the most common ways of collecting information or, worse, gaining deep, unauthorized access into enterprise systems and assets. In this module, learners master how to spot various forms of malware and spyware, what to do if they are encountered, and how to keep devices safe.
Protecting Personal DataData is increasingly the lifeblood of any enterprise, and protecting data is one of the key responsibilities of every employee. Through this module learners come to recognize the different types of enterprise data that are critical to protect, and the key do’s and don’ts for effective data protection.
Protecting Against Insider ThreatsThe world of cybersecurity threat has become an entire universe. This module alerts employees to the different types and sources of cybersecurity threats, intentional and unintentional, and how those threats can appear in the daily routine of any organization. Employees acquire best practices for safeguarding the organization’s critical assets.
Cyber Security and Social MediaSocial media are an increasingly prevalent part of daily life and work. In this module learners explore the cyber vulnerabilities that come with engaging in social media, and how cybercriminals and hackers exploit them. They acquire practical, effective ways to avoid or reduce the associated cyber risks.
KnowCyber® PCI DSS Training
QUICK, JUST-IN-TIME LEARNING FOR FRONT-LINE STAFF
Any business that accepts payment through credit cards must achieve and maintain compliance with the Payment Card Industry Data Security Standard (PCI DSS) administered by the PCI Security Standards Council.
Focused, regular training is a key part of PCI DSS compliance. Upon hire, and annually thereafter, staff members must receive training on the importance of cardholder data security, and how to ensure it.
Our PCI DSS for Restaurant Employees module helps your counter service or table service business keep customers’ data safe. In minutes, your front-line staff members learn exactly what they need to know:
- Their critical role in protecting cardholder data
- Key indicators and warning signs of fraud and fraudulent behavior
- Correct steps to take in response
OUR CONCISE, CONVENIENT TRAINING BRINGS PCI COMPLIANCE TO LIFE
- Live-action video, rich media, and interactive features engage learners and cover all key topics.
- Training can be completed whenever and wherever convenient—on mobile phones, tablets, or computers.
- Conceptual mastery is validated by a post-module assessment.
- A downloadable “@ a Glance” sheet summarizes key takeaways and can be posted for on-the-job reference.
Our courses give your people the cybersecurity knowledge they need.
We provide the latest technologies and best practices in learning and development.
We design anytime, anywhere training programs that engage and energize today’s workforce. Your people learn new behaviors quickly, and put them to work immediately.
We bring you the latest and best thinking in cybersecurity.
Our programs keep you at the forefront. As the cyber universe evolves constantly, our thought leaders provide expert perspective on cybersecurity developments as they happen. We draw on their insights continually to refresh our programs and develop new ones.