Success With Wombat
Hield kicked off training in early 2017 by sending an introductory email to his end users. He also invited users to try any (or all) of the other 35+ interactive training modules available within the platform. Within the first week, the team tracked 1,200 module completions (both mandatory and optional).
Hield had asked end users to complete the Security Essentials module within 90 days and was pleased when 80% met the deadline with just a courteous reminder email each month. It was also beneficial, Phillips reported, that “department leads acted as stakeholders during the campaign.” Managers reached out to him to identify staff who had not completed training “so they could personally incentivize them to do so.”
Another bright spot was the popularity of the optional training: Hield logged 4,120 voluntary completions over a six-month span, with mobile device security a particularly popular topic. One hundred employees took all of the available modules.
Onward and Upward
Hield continues to rely on the Wombat toolset to deliver ongoing, broad-based cybersecurity training, as well as more targeted education based on results from vulnerability assessments. He sends challenging ThreatSim® simulated phishing attacks — including those with corporate messaging and attachment lures — and tailors his follow-up training to address the vulnerabilities these tests reveal.
He is also planning mandatory GDPR training using Wombat’s GDPR modules in early 2019 — though, as Phillips reported, “he has noticed that a lot of people are already voluntarily doing [these modules].”
In addition to increased end-user engagement, Hield has seen “immense” ROI from his training efforts and a positive response from other areas of the business. When Hield presented the Veolia UK & Ireland program at a global security summit, Phillips noted, his colleagues “were blown away.”
“We can see the main difference [with the Wombat solution], and it ticks all the compliance boxes as well, which is important for us,” said Hield. “It really works for us.”
You can read the full article on the Intelligent CISO website.