Try Our Training Modules
Try demo versions of our more than 17 interactive training modules that are proven to change behavior and reduce risk.
PhishAlarm Email Reporting Button
Reinforce Secure Employee Behaviors, Fight Phishing Attacks

SaaS-Based Security Awareness and Training for End Users

Our Continuous Training Methodology

Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful security awareness and training programs.

Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.

Read the Case Studies

Evaluate Knowledge, Identify Vulnerabilities

An important first step to a comprehensive security awareness and training program is to assess your employees’ knowledge and your organization’s areas of susceptibility.

Learn More
Security Awareness Assessments: Mock Phishing Attacks and Knowledge Assessments

Knowledge Assessments

Use our scenario-based CyberStrength® Knowledge Assessments to gauge your staff’s understanding of a variety of cyber security topics.

Learn More

Simulated Attacks

Choose our customizable ThreatSim®, SmishGuru®, and USBGuru® simulated attacks to identify vulnerabilities to pervasive threat vectors without exposing your organization to an actual attack.

Learn More

Deliver Targeted, Impactful Training

Our interactive training modules are the key to educating your employees about security threats in the workplace and beyond. These 10- to 15-minute modules allow users to learn by doing, engaging them through hands-on decision-making.

  • Email Security / Anti-Phishing Security Awareness Training

    Email Security / Anti-Phishing

  • Mobile Device Security Awareness Training

    Mobile Device Security

  • Social Engineering Security Awareness Training

    Social Engineering

Interactive Security Awareness Training Module

Change Behavior, Reduce Risk

Our educational approach improves knowledge retention, creating longer-term behavior change. It’s also flexible: You can add customized content to highlight known issues, communicate policies, and more.

Learn More

Create a Culture of Security

It’s important to reinforce best practices learned in order to keep cyber security top-of-mind for your employees.

Our PhishAlarm® email reporting add-in enables employees to put their knowledge to use and report suspected phishing emails with the click of a button.

In addition, our portfolio of Security Awareness Materials allows you to highlight key messages and reward positive behaviors within your workplace.

Learn More
Phishing Email Add-In Security Awareness Materials

Analyze Results

The most effective training programs are flexible enough to adapt and change according to your needs. Our reporting tools allow you to gather powerful analytics about your organization’s strengths and weaknesses, calculate results, and plan future training accordingly.

Suggested Programs

Not sure which assessment and education components to select for your cyber security training programs? Our suggested plans identify the Wombat products that will help you target specific threat vectors.



The Anti-Phishing Training Suite combines simulated phishing attacks, our unique Auto-Enrollment feature, and three interactive training modules to help you reduce phishing risks. Learn More

Social Engineering

Social Engineering

Use our CyberStrength assessments and simulated attacks to evaluate susceptibility, and follow with training modules that help your users identify social engineering scams and react appropriately. Learn More

Compliance Programs

All employees have a role to play in maintaining compliance. We’ll help you assess and educate your employees about important components of PHI, PII, and PCI DSS. Learn More

View All Programs

What Others are Saying...

“We selected Wombat because they offer a comprehensive cyber security preparedness platform. Wombat’s platform enables us to assess internal risk and target training to employees who need it most, thereby strengthening our security profile.”

“We’ve been using Wombat’s PhishAlarm product for some time and can already see the positive impact it’s having on our organization. PhishAlarm easily replaced antiquated suspicious email reporting with a consistent and user friendly process that positively affected employee behavior.”

Wombat Security Blog

FBI Hack Proves That People Trump Technology in Cyber Security

Written By:

Stop me if you’ve heard this one before: a secure system was compromised by exploiting a user through social engineering. At this point, we’re all suffering from a bit of “breach fatigue” — but each incident undoubtedly provides the information security community opportunities to learn and improve. It’s critical to capitalize on these teachable moments because security breaches will only increase if the infosec community continues to underinvest in managing end-user risk and insists on looking to technology as the sole source of security controls.

Recap: ‘State of the Phish’ SecureWorld Webinar

Written By:

On January 28 — which just happened to be Data Privacy Day — Wombat sponsored and participated in SecureWorld’s State of the Phish – A 360-Degree View web conference. The session featured Wombat CTO Trevor Hawthorn as well as Garrett D. Felix, Privacy Officer and Information Security Officer for EXOS|MediFit, and moderator Dr. Faith Heikkila, CISO and Privacy Officer for Greenleaf Trust.

Stay on Target: How to Connect With Us at RSA Conference 2016

Written By:

Are you planning to attend RSA Conference 2016 in San Francisco from February 29 through March 4? We will be there in force, and there are several ways for you to connect with us during the conference:

Wombat’s ‘2016 State of the Phish’ Shows Double-Digit Rise in Phishing

Written By:

Earlier this week, we released our 2016 State of the Phish Report, which reveals the results of a survey of hundreds of security professionals as well as data compiled from millions of simulated phishing attacks sent between October 1, 2014, and September 30, 2015. The report reflects the reality that CISOs, CSOs, and their infosec teams are facing worldwide on a daily basis: phishing and spear phishing attacks are more prevalent — and more dangerous — than ever.