{"id":336,"date":"2024-03-12T05:08:35","date_gmt":"2024-03-12T05:08:35","guid":{"rendered":"https:\/\/cyberwissen.io\/pt\/solution\/penetration-testing-copy\/"},"modified":"2024-03-26T10:49:12","modified_gmt":"2024-03-26T10:49:12","slug":"managed-security-awareness","status":"publish","type":"solution","link":"https:\/\/cyberwissen.io\/pt\/solution\/managed-security-awareness\/","title":{"rendered":"Managed Security Awareness"},"content":{"rendered":"<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> <\/h4>\n<h3 class=\"  \">HOW IT WORKS <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1232689265  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_engage_blue.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Engage<\/h4>\n<p><p>Train and prepare employees to stop social engineering attacks, like phishing.<\/p>\n<p>\n<\/p>\n<div class=\"vGap25\"><\/div>\n<p> <a class=\"text-link\" href=\"#cyberwissendifference\">Learn More<\/a><\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=75229718  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_measure_blue.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Measure<\/h4>\n<p><p>Identify employees that fall behind threat topics require reinforcement.<\/p>\n<p>\n<\/p>\n<div class=\"vGap25\"><\/div>\n<p> <a class=\"text-link\" href=\"#cyberwissendifference\">Learn More<\/a><\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1701532313  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_transform_blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Transform<\/h4>\n<p><p>Achieve a culture of security and strengthen cyber resilience. <\/p>\n<p>\n<\/p>\n<div class=\"vGap25\"><\/div>\n<p> <a class=\"text-link\" href=\"#cyberwissendifference\">Learn More<\/a><\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap50\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-end\">\n<div class=\"col-lg-4 col-xs-12 text-left\">\n<h2 class=\"orange bold\">More Effective Security Awareness Program<\/h2>\n<p class=\"xl\">We provide the tools and expertise to develop the behaviours organizations need from their employees for better protection and stronger resilience. With Managed Security Awareness, you can avoid expensive security incidents and data breaches by having employees on the lookout for social engineering attacks, like phishing, and enables employees to report mistakes, or suspicious emails that could result in data loss. CyberWissen also watches for employee credentials on the dark web and alerts you when it discovers breaches.<\/p>\n<div class=\"vGap25\"><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<div class=\" col-lg-7  col-xs-12 offset-lg-1 text-left\">\n<div class=\"row\">\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=1087816258  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_training_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Awareness Training<\/span> <\/h4>\n<ul>\n<li> Employee-centric security microlearning<\/li>\n<li> Timely topics and threat vectors covered in each lesson<\/li>\n<li>Continuous engagement through gamification without administrative action<\/li>\n<\/ul>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=824182511  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_phishing_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Phishing Simulation<\/span> <\/h4>\n<ul>\n<li> Automated testing based on current phishing threats<\/li>\n<li>Built-in coaching when employee engages phishing simulation<\/li>\n<li>Tracking and reporting for employees and program administrator<\/li>\n<\/ul>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=419781398  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/022-phishing-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Report Phishing Button &#038; Analytics<\/span> <\/h4>\n<ul>\n<li>Enables employees to remove and report suspicious emails with the click of a button<\/li>\n<li>Reported email details and analysis displayed in admin dashboard supporting faster response to potentially malicious emails<\/li>\n<\/ul>\n<\/p><\/div>\n<\/p><\/div>\n<\/div><\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<section class=\"\" id=\"cyberwissendifference\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-start\">\n<div class=\"col-lg-8 col-xs-12 text-left\">\n<h3>The CyberWissen Difference <\/h3>\n<h2 class=\"orange bold\">Recognize and Neutralize Social Engineering Attacks and Human Error<\/h2>\n<p class=\"xl\">\n<p>CyberWissen Managed Security Awareness enables employees to recognize and neutralize social engineering attacks and human error through microlearning content, automated phishing simulations, and awareness coaching.<\/p>\n<p>&nbsp;<\/p>\n<\/p>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/div>\n<div class=\"row justify-content-start\">\n<div class=\"col  text-center\">\n<div class=\"icon_column\">\n<p>                     <img data-opt-id=1438152353  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_microlearning_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Microlearning<\/h4>\n<p>Brief, purpose-driven, frictionless content designed for optimal learning and behavioral adoption.<\/p>\n<div class=\"vGap50\"><\/div>\n<p>               <img data-opt-id=445245224  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_sprint_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Leaderboard<\/h4>\n<p>Employees carn points based on their participation and engagement in the Managed Security Awareness program. Admins can keep an eye on employee points in the Leaderboard.<\/p>\n<div class=\"vGap50\"><\/div>\n<p>               <img data-opt-id=2120714615  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_threat_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Current Threat  Vectors<\/h4>\n<p>Relevant content informed by real world threat intel and industry trends.<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col  text-center\">\n<div class=\"icon_column\">\n<p>                     <img data-opt-id=1087816258  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_training_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Employee Performance<\/h4>\n<p>Identity employee risk with quizzes, automated phishing simulations, and<br \/>\nreport cards.<\/p>\n<div class=\"vGap50\"><\/div>\n<p>               <img data-opt-id=663041572  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_supply-chain-3_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Program Effectiveness<\/h4>\n<p>Track and measure your Culture Score based on employee behaviors.\n<\/p>\n<div class=\"vGap50\"><\/div>\n<p>               <img data-opt-id=941540917  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/012-news-report.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Reported Emails<\/h4>\n<p>See your employees do their part to protect their inboxes and your organization by reporting suspicious emails.<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col  text-center\">\n<div class=\"icon_column\">\n<p>                     <img data-opt-id=905681092  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/025-employee.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\"> Employee Confidence<\/h4>\n<p>Positive reinforcement and guidance to develop security awareness champions.<\/p>\n<div class=\"vGap50\"><\/div>\n<p>               <img data-opt-id=1321995114  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/023-cyber-security-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Cyber Resilience<\/h4>\n<p>Reduce the risk of social engineering attacks with prepared and alert employees.<\/p>\n<div class=\"vGap50\"><\/div>\n<p>               <img data-opt-id=1147885438  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_security-3_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Security Culture<\/h4>\n<p>Peer-to-peer coaching with your CST to advance your awareness program.<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap50\"><\/div>\n<div class=\"row justify-content-start\">\n<div class=\"col-lg-12 col-xs-12 text-center\">\n<div class=\"vGap50\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<section class=\"\" id=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-start\">\n<div class=\"col-lg-8 col-xs-12 text-left\">\n<h3>Delivered <\/h3>\n<h2 class=\"orange bold\">The cyberwissen security teams<\/h2>\n<p class=\"xl\">\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/div>\n<div class=\"row justify-content-start\">\n<div class=\"col  text-center\">\n<div class=\"icon_column_horizontal_gradient\">\n<p>                     <img data-opt-id=905681092  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/025-employee.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Onboarding<\/h4>\n<p>Meet with your named Concierge Security Engineer (CSE) who will assist your rollout and help progress your security awareness program. \u200b\n<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col  text-center\">\n<div class=\"icon_column_horizontal_gradient\">\n<p>                     <img data-opt-id=1984160058  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/003-analytic.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">PROGRAM ROLLOUT<\/h4>\n<p>Kick off your program in the best way possible, as your CSE guides you through best practices that get employees ready to participate.<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col  text-center\">\n<div class=\"icon_column_horizontal_gradient\">\n<p>                     <img data-opt-id=1058739808  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/029-mission.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Program Coaching<\/h4>\n<p>Your CSE identifies<br \/>\nhotspots and reviews the<br \/>\nprogress of your security<br \/>\njourney during regularly<br \/>\nscheduled meetings.\u200b<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col  text-center\">\n<div class=\"icon_column_horizontal_gradient\">\n<p>                     <img data-opt-id=1744955582  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/024-Grow-up.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Key Metrics<\/h4>\n<p>Review employee participation, phishing simulation results, quiz scores, awareness program leaderboard, and<br \/>\noverall security culture of your organization.<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap50\"><\/div>\n<div class=\"row justify-content-start\">\n<div class=\"col-lg-12 col-xs-12 text-center\">\n<p>  <a class=\"btn border getaquote\" href=\"#\">request a demo<\/a><\/p>\n<div class=\"vGap50\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<section class=\"\" id=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-start\">\n<div class=\"col-lg-8 col-xs-12 text-left\">\n<h3><\/h3>\n<h2 class=\"orange bold\">How CyberWissen Incorporates the Cybersecurity strategies A|B|C Into Your Security Venture<\/h2>\n<p class=\"xl\">\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/div>\n<div class=\"row justify-content-start\">\n<div class=\"col  text-center\">\n<div class=\"icon_column_with_left_border\">\n<p>                     <img data-opt-id=1058739808  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/029-mission.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Onboarding<\/h4>\n<p>Prepare, launch, and run your awareness program focused on outcomes<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col  text-center\">\n<div class=\"icon_column_with_left_border\">\n<p>                     <img data-opt-id=905681092  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/025-employee.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Behaviour<\/h4>\n<p>Drive individual and organizational progress toward desired behaviours.<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col  text-center\">\n<div class=\"icon_column_with_left_border\">\n<p>                     <img data-opt-id=134285355  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/004-brainstorming.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<h4 class=\"bold uppercase\">Culture<\/h4>\n<p>Transform employees to be 24&#215;7 cybersecurity champions.<\/p>\n<div class=\"vGap50\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap50\"><\/div>\n<div class=\"row justify-content-start\">\n<div class=\"col-lg-12 col-xs-12 text-center\">\n<div class=\"vGap50\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap50\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-end\">\n<div class=\"col-lg-4 col-xs-12 text-left\">\n<h2 class=\"orange bold\"><\/h2>\n<p class=\"xl\">Being a security expert does not make a person a security awareness expert. Protecting networks and devices is different from preparing people. An effective security awareness program starts with the right content, and this requires expertise in three areas: security, education, and production. CyberWissen has all three:<\/p>\n<div class=\"vGap25\"><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<div class=\" col-lg-7  col-xs-12 offset-lg-1 text-left\">\n<div class=\"row\">\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>          <img data-opt-id=483596086  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/wp-content\/uploads\/2024\/03\/shield_508281-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" class=\"optimole-lazy-only  icon\" \/><\/p>\n<p class=\"xl bold\"><span class=\"\">Security Experts<\/span> <\/h4>\n<ul>\n<li> Concierge Security \u00ae Team<\/li>\n<li> 24\/7 Threat Detection<\/li>\n<li> Internal and External Threat Intelligence<\/li>\n<\/ul>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>          <img data-opt-id=483596086  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/wp-content\/uploads\/2024\/03\/shield_508281-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" class=\"optimole-lazy-only  icon\" \/><\/p>\n<p class=\"xl bold\"><span class=\"\">Phishing<\/span> <\/h4>\n<ul>\n<li> Simulation<\/li>\n<li>Raise Awareness<\/li>\n<li>Change behaviour<\/li>\n<li>Foster Culture Change<\/li>\n<li>Awareness Coaching<\/li>\n<\/ul>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>          <img data-opt-id=483596086  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/wp-content\/uploads\/2024\/03\/shield_508281-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" class=\"optimole-lazy-only  icon\" \/><\/p>\n<p class=\"xl bold\"><span class=\"\">Production Experts<\/span> <\/h4>\n<ul>\n<li> Hollywood Quality<\/li>\n<li> Engaging and Memorable<\/li>\n<li> Appeals to Viewers<\/li>\n<li> Rapid Delivery<\/li>\n<\/ul>\n<\/p><\/div>\n<\/p><\/div>\n<\/div><\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<div class=\"vGap15\"><\/div>\n<section id=\"howItWorks\" class=\"\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"bold primary uppercase\"> Microlearning for Awareness and Behaviour Change <\/h4>\n<div class=\"xl\">\n<p>Organizations everywhere struggle to reduce the risk of cyberattacks\u2014especially attacks targeting their employees. Every day, highly motivated threat actors set their sights on employees. Unfortunately, most employees are left unprepared because the training they receive is so infrequent that it never stays top of mind. People forget 80% of what they learn in less than a month if they are not re-engaged. Contrast that with ongoing microlearning, which improves retention by 200%.<\/p>\n<p>\n<\/div>\n<\/div><\/div>\n<div class=\"vGap15\"><\/div>\n<div class=\"row  scroll-solution-tiles\"><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<div class=\"vGap15\"><\/div>\n<section id=\"howItWorks\" class=\"\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"bold primary uppercase\"> Defend Against Phishing the CyberWissen Way <\/h4>\n<div class=\"xl\">\n<p>This is a NO-SHAME zone. CyberWissen educates all employees on what to watch out for in our ongoing microlearning content, and performs phishing simulations to assess if employees recognize phishing emails. A big difference between our approach and others is that we don\u2019t try to trick your employees. If an employee clicks on a phishing simulation link, we provide an immediate follow-up lesson with an image of the phishing email they just clicked. The email is labelled with interactive red flags, so they learn what to watch out for and can better determine if an email is trustworthy.<\/p>\n<p>\n<\/div>\n<\/div><\/div>\n<div class=\"vGap15\"><\/div>\n<div class=\"row  scroll-solution-tiles\"><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-center\">\n<div class=\"col-lg-6 col-xs-12 text-left\">\n<h4 class=\"blue\"><\/h4>\n<h2 class=\"mb-2\">Monthly Cadence<\/h2>\n<div class=\"white\">\n<p>CyberWissen\u2019s microlearning strategy includes multiple touchpoints per month to keep security  top of mind, raise awareness, and change behaviour<\/p>\n<p><\/p><\/div>\n<div class=\"vGap25\"><\/div>\n<h4 class=\"blue\"><\/h4>\n<h2 class=\"mb-2\"><\/h2>\n<div class=\"white\">\n<div class=\"row justify-content-start\">\n<div class=\"col-lg-6 col-xs-12 text-left\">\n<h4 class=\"mb-2\">Microlearning Sessions <\/h4>\n<ul class=\"simpleList\">\n<li>Videos <\/li>\n<li>Quizzes <\/li>\n<li>Interactive Lessons<\/li>\n<\/ul><\/div>\n<div class=\"col-lg-6 col-xs-12 text-left\">\n<h4 class=\"mb-2\">Phishing Simulations <\/h4>\n<ul class=\"simpleList\">\n<li>Current Threat Vectors <\/li>\n<li>Integrated Follow-up <\/li>\n<li>Interactive Lessons<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap25\"><\/div>\n<h4 class=\"blue\"><\/h4>\n<h2 class=\"mb-2\">A Friction-Free Experience<\/h2>\n<div class=\"white\">\n<p>Cybersecurity isn\u2019t every employee\u2019s primary job function, but every employee needs to be an active participant in the security posture of their organization. Employees are expected to stay up to date on their security awareness training and CyberWissen makes it easy for them to get their jobs done while staying secure.<\/p>\n<p><\/p>\n<ul><\/p>\n<li>Delivered to employee inboxes<\/li>\n<p><\/p>\n<li>No username or password required<\/li>\n<p><\/p>\n<li>Done in 3 minutes or less<\/li>\n<p><\/p>\n<li>Monthly report cards with links to missed sessions<\/li>\n<p>\n<\/ul>\n<p><\/p><\/div>\n<div class=\"vGap25\"><\/div>\n<\/ul>\n<\/div>\n<div class=\"col-lg-6 col-xs-12 text-center\">\n  <img data-opt-id=365564630  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/temp_vert_image-1.jpg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" alt=\"Image\">\n<\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap50\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-end\">\n<div class=\"col-lg-4 col-xs-12 text-left\">\n<h2 class=\"orange bold\">Always New, Never Repeated<\/h2>\n<p class=\"xl\">As cyber threats evolve and change, so does our content. We are always creating fresh and new content so you can be confident that your employees will be up to date on the latest threat topics. <\/p>\n<p>You never need to schedule or curate lessons because we do that for you as part of a fully managed security awareness solution. Previous lessons are also available to send to new employees, and topics are frequently reinforced across your organization with fresh lessons to ensure engagement.<\/p>\n<div class=\"vGap25\"><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<div class=\" col-lg-7  col-xs-12 offset-lg-1 text-left\">\n<div class=\"row\">\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=1228604007  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/026-ransomware.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Threat Topics Include<\/span> <\/h4>\n<p>Recognizing and Defending Against Attacks<\/p>\n<ul>\n<li>Spear Phishing<\/li>\n<li>Vishing Calls<\/li>\n<li>Phishing Emails<\/li>\n<li>Smishing<\/li>\n<li>Social Engineering<\/li>\n<\/ul>\n<p>Compliance content pack Add-on Add-on<\/p>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=700133259  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/026-pendrive.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Security Best Practices<\/span> <\/h4>\n<ul>\n<li> Remote Work Best Practices<\/li>\n<li> Cyber Hygiene Best Practices<\/li>\n<li> Preventing Account Takeover<\/li>\n<li> Defending Against Credential<\/li>\n<li> Theft and Brute Force Attacks<\/li>\n<li> Identifying Spoofed Websites<\/li>\n<li> Recognizing Insider Threats<\/li>\n<\/ul>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=1680820775  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/026-local-network.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Culture<\/span> <\/h4>\n<ul>\n<li> Dangers of Device Sharing<\/li>\n<li> Dangers of Public Wi-Fi<\/li>\n<li> Dangers of Lost or Stolen<br \/>\nDevices<\/li>\n<li> Threat of Shoulder Surfing<\/li>\n<li> Threat of Dumpster Diving<\/li>\n<li> Threat of Tailgating<\/li>\n<\/ul>\n<\/p><\/div>\n<\/p><\/div>\n<\/div><\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<section id=\"whyChoose\" class=\"bg_1\">\n<div class=\"container\">\n<div class=\"row justify-content-center\">\n<div class=\"col-lg-8 col-xs-12  text-center\">\n<h3 class=\"bold primary uppercase\">Always New, Never Repeated <\/h3>\n<div class=\"vGap10\"><\/div>\n<p class=\"xl\">CyberWissen Managed Security Awareness delivers security awareness education aligned with the way adults learn and embrace new concepts. Managed Security Awareness Plus is for organizations that require industry- and role-specific lessons for their employees.<\/p>\n<\/div><\/div>\n<div class=\"vGap15\"><\/div>\n<div class=\"compareTableContainer\">\n<div class=\"row justify-content-center\">\n<div class=\"col-lg-8 col-xs-12  text-center\">\n<div class=\"row\">\n<div class=\"col tableHeader  text-left\">\n<p>              Content      <\/p><\/div>\n<div class=\"col tableHeader  text-center\">\n<p>                Managed security awareness      <\/p><\/div>\n<div class=\"col tableHeader text-center\">\n<p>               Managed security awareness pluss         <\/p><\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Fully managed content creation and delivery<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Three minutes or less<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Always fresh, never repeated<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Delivered twice a month<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Based on recent attacks<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Designed by security and education experts<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Covers cyber social engineering attacks<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Covers physical social engineering attacks<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Hatibu8 content<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=1987791368  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_no.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Industry- specific content<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=1987791368  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_no.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Role- based content<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 <img data-opt-id=1987791368  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_no.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 <img data-opt-id=597666704  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/themes\/cyberwissen\/images\/icon_yes.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"\/>         <\/p><\/div>\n<\/p><\/div>\n<hr\/>\n<div class=\"row\">\n<div class=\"col  text-left\">\n<p>              <span class=\"row_label\"> Compliance content pack<\/span><\/p><\/div>\n<div class=\"col  text-center\">\n<p>                 Add-on      <\/p><\/div>\n<div class=\"col text-center\">\n<p>                 Add-on         <\/p><\/div>\n<\/p><\/div>\n<hr\/><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n \n<section class=\"\">\n    <div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-center\">\n  \n\n\n<div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padR50\">\n\n  \n         \n      \n           <h4 class=\"blue\">Compliance content pack Add-on <\/h4>\n\n         \n        \n   <div class=\"white\">   \n   <p>CyberWissen Managed Security Awareness delivers security awareness education aligned with the way adults learn and embrace new concepts. Managed Security Awareness Plus is for organizations that require industry- and role-specific lessons for their employees.<\/p><br \/>\n   \n   \n \n\n \n       \n       \n         \n   \n    \n    \n   \n   <\/div>\n  \n   <div class=\"vGap25\"><\/div>\n      \n      \n\n  \n      \n      \n         \n        \n   <div class=\"white\">   \n      \n   \n \n\n \n       \n       \n         \n    <img decoding=\"async\" style=\"max-width:100% !important; margin:0 auto;\" src=\"\" \/>\n   \n    \n    \n   \n   <\/div>\n  \n   <div class=\"vGap25\"><\/div>\n      \n      \n\n  \n      \n           <h4 class=\"blue\">Take a time-traveling tour into  the future of security awareness.<\/h4>\n\n         \n        \n   <div class=\"white\">   \n   <p>Hop in and see for yourself what it\u2019s like to be an CyberWissen Managed Security Awareness customer. You\u2019ll participate in some microlearning sessions, find out what your Concierge Security Team can do for you, and discover how an ongoing program can change your company culture.<\/p><br \/>\n   \n   \n \n\n \n       \n       \n         \n   \n    \n    \n   \n   <\/div>\n  \n   <div class=\"vGap25\"><\/div>\n      \n      \n\n   \n \n<\/ul>\n<\/div>\n\n<\/div>\n\n   <div class=\"col-lg-6 col-xs-12 text-left\"> \n<div class=\"padL50\">\n\n  \n         \n             <h4 class=\"blue\">Compliance Training Topics categorised based on industry<\/h4>\n\n       \n   <div class=\"white\">\n   \n      \n   \n   \n     \n    <ol class=\"numberList\">\n\n         \n        <li><p class=\" bold primary\" >Finance Focus<\/p>\n        \n        \n                 <ul>\n       \n        <li>PCI for Users, IT and Managers<\/li>\n                  <\/ul>\n                <\/li>\n       \n        \n          \n        <li><p class=\" bold primary\" >Healthcare Focus<\/p>\n        \n        \n                 <ul>\n       \n        <li>HIPAA Compliance Courses (Essentials, Privacy Rule, and Security Rule)<\/li>\n           \n        <li>OSHA: Airborne and Blood-Borne Pathogens<\/li>\n                  <\/ul>\n                <\/li>\n       \n        \n          \n        <li><p class=\" bold primary\" >Higher Education Focus <\/p>\n        \n        \n                 <ul>\n       \n        <li>Title IX <\/li>\n           \n        <li>FERPA<\/li>\n                  <\/ul>\n                <\/li>\n       \n        \n          \n        <li><p class=\" bold primary\" >HR Focus <\/p>\n        \n        \n                 <ul>\n       \n        <li>GDPR <\/li>\n           \n        <li>Anti-Discrimination <\/li>\n           \n        <li>Sexual Harassment Prevention (General and EU State Specific) <\/li>\n           \n        <li>Affirmative Action and Equal Employment <\/li>\n           \n        <li>FMLA (Family Medical Leave Act)<\/li>\n                  <\/ul>\n                <\/li>\n       \n        \n          \n        <li><p class=\" bold primary\" >Security Focus <\/p>\n        \n        \n                 <ul>\n       \n        <li>Security Essentials<\/li>\n                  <\/ul>\n                <\/li>\n       \n        \n           <\/ol>\n\n  \n\n   \n    \n    \n   \n   <\/div>\n  \n\n      \n      \n\n   \n \n<\/ul>\n\n <\/div>\n<\/div>\n  \n \n<\/div>\n    <div class=\"vGap15\"><\/div>\n<\/section>\n<br \/>\n<section class=\"\">\n<div class=\"vGap50\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-end\">\n<div class=\"col-lg-4 col-xs-12 text-left\">\n<h2 class=\"orange bold\">Outcomes<\/h2>\n<p class=\"xl\">Managed Security Awareness Training Addresses the Most Common Cyberthreats by Influencing Behavior and Fostering a Security Culture<\/p>\n<div class=\"vGap25\"><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<div class=\" col-lg-7  col-xs-12 offset-lg-1 text-left\">\n<div class=\"row\">\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=1336772111  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/034-trojan-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Improve  Protection<\/span> <\/h4>\n<p>Prepare employees to recognize and neutralize social engineering attacks, like phishing.<\/p>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=1254075637  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/034-data-security-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Strengthen Resilience<\/span> <\/h4>\n<p>Empower employees to identify cyber risks and report mistakes that cloud expose sensitive data.<\/p>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<p>         <img data-opt-id=1794562352  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/035-backdoor-blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\"  class=\"optimole-lazy-only  icon\"\/><\/p>\n<p class=\"xl bold\"><span class=\"\">Achieve  Compliance <\/span> <\/h4>\n<p>Deliver security awareness training for regulatory compliance.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div><\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<div style=\"height:75px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<section id=\"whyChoose\" class=\"bg_1\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h3 class=\"bold primary uppercase\">The Benefits of CyberWissen&#8217;s Managed Security Awareness Service <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row scroll-solution-tiles\">\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1106933921  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/033-trojan.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Enhanced Cybersecurity Knowledge <\/h4>\n<p>Our service provides customised training content and regular employee training sessions to improve employees&#8217; understanding of cybersecurity best practices, empowering them to recognize and respond effectively to cyber threats.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=487171066  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/033-satellite-dish.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4> Reduced Vulnerability to Cyber Attacks <\/h4>\n<p>By increasing employees&#8217; awareness of common cyber threats such as phishing emails, scams, and malware, our service helps reduce the organisation&#8217;s susceptibility to cyber attacks, ultimately enhancing its overall cybersecurity posture.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1590131349  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/033-malware.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Proactive Risk Management <\/h4>\n<p>Our service includes ongoing support, such as phishing simulation exercises and tracking of security awareness metrics, enabling organisations to proactively identify and address potential security vulnerabilities before they escalate into major incidents.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n      <img data-opt-id=1578539568  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/033-firewall.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Compliance Requirements: <\/h4>\n<p>\n Many industry regulations and standards require organisations to implement security awareness training programs for employees. Our service helps organisations meet these compliance requirements and demonstrate their commitment to cybersecurity best practices.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"gradientTile\">\n<div class=\"content\">\n         <img data-opt-id=483596086  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/wp-content\/uploads\/2024\/03\/shield_508281-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4>Actionable Insights <\/h4>\n<p>\nCost-Effective Solution: Investing in cybersecurity awareness training can significantly reduce the risk of costly data breaches and security incidents. Our Managed Security Awareness service offers a cost-effective solution for organisations to strengthen their security posture and protect their sensitive data and assets.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>This includes developing customised training content, conducting regular employee training sessions, and monitoring employee engagement and understanding of cybersecurity best practices. <\/p>\n","protected":false},"featured_media":2724,"template":"","meta":{"inline_featured_image":false},"class_list":["post-336","solution","type-solution","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution\/336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/solution"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/2724"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}