Continuous Training Methodology

Continuous Education Yields Measurable Results

Overview

Assess, Educate, Reinforce, Measure

Have you given thought to why presentations, videos, and simple slides aren’t terribly effective tools when it comes to knowledge retention? We certainly have. And we believe that while these formats are appropriate methods for informing users, they aren’t engaging enough to truly educate users.

security awareness training methodology

Now consider the industry research that has shown that once-a-year classroom and video training is not effective in the battle against cyber-attacks. Put these two elements together, and you’ll start to get a sense of why our Continuous Training Methodology is based on a cyclical approach that both informs users about best practices and teaches users how to employ these practices when they face security threats. Some of our customers have seen a marked reduction in susceptibility in as few as two months, and our continuous training methodology allows you to capitalise and build on this initial rise in awareness, effectively changing behaviours over time.

A continuous cycle of assessmenteducationreinforcement, and measurement maximises learning and lengthens retention. Our training methodology sits in strong contrast to a “one and done” approach, giving you the flexibility to evolve your program over time, identify areas of susceptibility, and deliver targeted training when and where it’s most needed.

Our customers have experienced up to a 90% reduction in successful external phishing attacks and malware infections using this four-step approach to security awareness and training.

Assess

An important first step to a comprehensive security awareness and training program is to evaluate your employees’ knowledge and your organisation’s susceptibility. We offer customisable assessments and simulated attacks (e.g., mock phishing emails), as well as Teachable Moments that provide tips and practical advice for employees who fall for mock phishing, smishing, and USB attacks. These brief exercises explain the dangers of actual attacks and help motivate employees to participate in follow-up training.

Educate

Our interactive training modules are the key to educating your employees about security threats in the workplace and beyond. These 10- to 15-minute modules give users the opportunity to understand the types of risks they might encounter and recognise how their actions can have a positive impact on the safety and security of corporate and personal assets. Our Auto-Enrollment feature allows you to automatically assign training to employees who fall for simulated phishing attacks and those users who don't exhibit a desired level of proficiency on Predefined CyberStrength® assessments.

Reinforce

Our Security Awareness Materials — a library of images, posters, articles, and gifts — help you emphasise best practices and positive behaviours within your workplace. By making these messages more visible and more recognisable, you reinforce your training and help employees retain their knowledge.

Measure

We feel the most effective training program is one that is flexible enough to adapt and change according to your needs. That’s why measurement is so important. Our training approach allows you to gather powerful analytics about your organisation’s strengths and weaknesses, evaluate results, and plan future training accordingly prior to repeating the four-step cycle.