Awareness programmes

People-centric security

We make not just an awareness program. We train practical security skills. We instil a security culture and foster secure thinking and behaviour. We periodically measure our performance with social engineering penetration tests.

Our features in security awareness and user behaviour management:

serviceHigh-quality teaching
Trainers with experience in teaching IT and corporate security since 2000.
serviceCaptivating materials
We actively use multimedia and interactive tools, develop fascinating educational films, animations, etc.
serviceReduced maintenance effort
Automated management of notifications, as well as reminders and escalations, relieves you of the burden of manual event management.
serviceEffective feedback and KPIs
Testing the effectiveness of the program using socio-technical penetration tests.
REQUEST A QUOTE

Awareness methods and components:

  1. Instructing about security rules during interviews before hiring.
  2. Signing commitments (security policy, code of ethics, non-disclosure agreement, personal data, copyright, etc.).
  3. Security responsibilities in job descriptions and security briefings by line managers when introducing a new employee.
  4. Face-to-face and online training, as well as probation testing. Successful testing is a condition for passing the probationary period.
  5. Regular testing of personnel (every 1, 2 or 3 years).
  6. Training and workshops for selected user groups (managers, accountants, software developers, marketing and sales, PR, etc.).
  7. Training and workshops on selected relevant topics for anyone interested (PCI DSS, blockchain, secure software development, SDLC, penetration testing, Risk Management, BCM, Operations Security, Incident Management, etc.).
  8. Automatic tracking system for training and testing, with reminders, escalations, and calculation of statistics for departments.
  9. Information security blog.
  10. Notifying by e-mail: follow-ups on incidents in the company and in the world, warnings about major vulnerabilities, security rules, disciplinary measures, etc.
  11. Groups in messengers. Duplicate mailing lists and small notifications.
  12. Handouts (booklets, brochures, etc.).
  13. Posters on walls, doors, dining rooms, toilets, etc.
  14. Electronic posters (banners) on corporate intranet websites. Replacement of website ads with the posters, using the anti-banner filter on the corporate proxy server.
  15. Security research community. Discussing security issues online and offline in a select group.
  16. Training of project team members about the customers’ security specifics.
  17. Training for customers, suppliers, and partners.
  18. Polls. Receiving and analyzing user feedback.
  19. Games, contests, competitions.
  20. Taking into account the comments of the Incident Response Committee during regular performance appraisals and estimations of career growth.
  21. Proactive Security Awareness. Friendly, corporate-style warning tips that are generated in real-time before the users try to take a potentially dangerous action (opening a website, attachments, etc.).

Service summary

⏳ Duration of project or delivery

Typically, the program development takes 2 to 8 weeks. Training takes several hours, and other activities can be scheduled annually.

🎁 Can it be free or have a testing period?

Free consultation and initial analysis of business requirements.

💼 What type of business needs it?

Businesses handling sensitive information, operating in highly regulated industries, or facing cybersecurity threats, especially social engineering.

💡 When is this service needed?

When your users need to know more about security: during onboarding or major changes, when you have regulatory requirements or security incidents.

📈 Your profit

Reduced risk of costly data breaches or other security incidents, noncompliance penalties, lawsuits, or reputation damage.

⚙️ Our methods and tools

Training sessions, e-learning courses, webinars, workshops, videos, posters, infographics, quizzes, games, etc.

📑 Deliverables

Curriculum, training materials, handouts, policies and procedures, attendance logs, automatic reminders, program’s effectiveness evaluations, etc.

Check out our additional services and business cases. Send the form below to request the awareness programme. Get a free consultation.

REQUEST A QUOTE

FAQ

Whaling cyber awareness:

  • Focuses on preventing targeted attacks ("whaling" or "CEO fraud")
  • Trains employees to recognize and respond to high-level executive impersonation
  • Covers tactics like spoofed emails and domain names
  • Teaches verification of senior staff requests
  • Helps prevent financial loss, data breaches, and reputational damage

Importance of cybersecurity awareness training:

  • Protects against cyber threats
  • Mitigates risks of data breaches
  • Ensures compliance with regulations (e.g., GDPR, HIPAA)
  • Promotes a culture of security
  • Reduces financial and reputational risks

Cybersecurity awareness training:

  • Educates individuals on cybersecurity best practices
  • Covers topics like password management, email security, phishing, malware, etc.
  • Aims to teach threat recognition, prevention, and incident response
  • Can be delivered through various methods (online modules, classroom sessions, webinars, simulations)
  • Is customizable to fit specific organizational needs

Effective methods include:

  • Interactive online modules
  • Simulations and drills
  • Classroom training
  • Phishing simulations
  • Gamification

The most effective method depends on organizational needs and employee preferences. Regular, ongoing training is crucial.

An IT professional awareness program:

  • Educates IT staff on latest cybersecurity threats and best practices
  • Covers network security, application security, endpoint security, incident response, and compliance
  • Can be delivered through various methods
  • Should be customized and regularly updated
  • Is critical for organizational cybersecurity strategy

Cost factors include:

  • Organization size
  • Training program complexity
  • Level of customization
  • Delivery method

Costs can range from free online resources to thousands per employee for customized, in-person training. However, the investment is typically worthwhile compared to potential cyber attack damages.

Business cases of projects we completed

Audit of smart contracts and blockchain
Business Automation
Information security incident response and investigation
Managed security and compliance (ISO 27001, etc.)
Security analysis of software source code
Security assessment: audits and penetration tests
Security Operations Center cases