Recently I was part of a panel discussion on combatting ransomware at the SecureWorld Atlanta event. An interesting conversation developed around the old stalwart of patching computers and systems. A solid patching process is one of the most elementary parts of an organization’s security program — or at least it should be.
SaaS-Based Security Awareness and Training for End Users
SaaS-Based Security Awareness and Training for End Users
Our Continuous Training Methodology
Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful cyber security awareness and training programs.
Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.Read the Case Studies
Evaluate Knowledge, Identify Vulnerabilities
An important first step in comprehensive cyber security awareness and training for employees is to assess your employees’ knowledge and your organization’s areas of susceptibility.Learn More
Use our scenario-based CyberStrength® Knowledge Assessments to gauge your staff’s understanding of a variety of cyber security topics.Learn More
Choose our customizable ThreatSim®, SmishGuru®, and USBGuru® simulated attacks to identify vulnerabilities to pervasive threat vectors without exposing your organization to an actual attack.Learn More
Deliver Targeted, Impactful Training
Our interactive training modules are the key to educating your employees about security threats in the workplace and beyond. These 10- to 15-minute modules allow users to learn by doing, engaging them through hands-on decision-making.
Email Security / Anti-Phishing
Mobile Device Security
Change Behavior, Reduce Risk
Our educational approach improves knowledge retention, creating longer-term behavior change. It’s also flexible: You can add customized content to highlight known issues, communicate policies, and more.Learn More
Create a Culture of Security
It’s important to reinforce best practices learned in order to keep cyber security top-of-mind for your employees.
Our PhishAlarm® email reporting add-in enables employees to put their knowledge to use and report suspected phishing emails with the click of a button.
In addition, our portfolio of Security Awareness Materials allows you to highlight key messages and reward positive behaviors within your workplace.Learn More
The most effective training programs are flexible enough to adapt and change according to your needs. Our reporting tools allow you to gather powerful analytics about your organization’s strengths and weaknesses, calculate results, and plan future training accordingly.
Not sure which assessment and education components to select for your cyber security training programs? Our suggested plans identify the Wombat products that will help you target specific threat vectors.
The Anti-Phishing Training Suite combines simulated phishing attacks, our unique Auto-Enrollment feature, and three interactive training modules to help you reduce phishing risks. Learn More
Use our CyberStrength assessments and simulated attacks to evaluate susceptibility, and follow with training modules that help your users identify social engineering scams and react appropriately. Learn More
Healthcare settings provide their own unique challenges. Use our healthcare-focused assessments and short, interactive training to build an effective program. Learn More
What Others are Saying...
“We’ve been using Wombat’s PhishAlarm product for some time and can already see the positive impact it’s having on our organization. PhishAlarm easily replaced antiquated suspicious email reporting with a consistent and user friendly process that positively affected employee behavior.”
“We selected Wombat because they offer a comprehensive cyber security preparedness platform. Wombat’s platform enables us to assess internal risk and target training to employees who need it most, thereby strengthening our security profile.”
Wombat Security Blog
User Risk Report Shows Marked Lack of Security Awareness Among Workers
Earlier this week, we released our 2017 User Risk Report, which features the results of a survey of more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — who were asked about cybersecurity topics and best practices that are fundamental to data and network security. What we found out about the personal habits of these individuals was sometimes heartening, occasionally perplexing, and frequently terrifying — but always enlightening.
An interesting note before you dive into the highlights below: Our survey concluded less than 24 hours before the first reports of the global WannaCry ransomware attack began to spread. As such, the responses of the participants were not influenced by the increased media exposure that resulted from WannaCry.
Ransomware and Phishing Attacks: Why Anti-Virus Software Can't Save You
Installing and keeping anti-virus software up to date on computers and mobile devices has become a de facto cybersecurity best practice — and for good reason. Like other technical safeguards, anti-virus software has come a long way in its sophistication since its early days in the late 1980s and early 1990s. There are many reliable and reputable options for anti-virus and anti-malware protection for corporate organizations and personal devices, and they provide an important layer of security for data, devices, and systems.
But you cannot count on them to stop ransomware infections, and they absolutely cannot prevent phishing emails from reaching your inbox.
Five Tips from CISOs for Managing Emerging Cybersecurity Threats
I recently had the opportunity to visit SecureWorld Atlanta 2017, where I met a number of industry experts and attended several sessions. One of those sessions was a panel discussion titled, “Hazards on the Horizon – Emerging Threats.” The panel of CISOs discussed both the current cyber threat landscape and offered advice for keeping networks and systems as secure as possible during this era of frequent cyberattacks. Each of the five panelists was asked to provide their one key piece of advice. Here’s what they said: