cyberstrength - wombat security€¦ · wombat security technologies was born from research at the...

4
CYBERSTRENGTH Actionable Assessments of Security Knowledge CyberStrength ® is the first-of-its kind employee assessment solution that enables you to create, administer, and analyze the results of a custom security knowledge evaluation, all via our SaaS-based Security Education Platform. Our comprehensive portfolio of questions cover a range of subjects, including safe interactions with emails, URLs, and websites; proper use of mobile devices and mobile apps; understanding and avoiding social engineering scams; and other behaviors that can negatively impact your people, areas, data, and systems. You can also create your own questions to assess understanding of company-specific policies and the pervasiveness of known issues. Assessments are a key part of the Wombat Continuous Training Methodology, which our customers have used to achieve up to a 90% reduction in successful phishing attacks and malware infections by implementing the continuous process of assess, educate, reinforce and measure. What Is CyberStrength? MEASURE ASSESS REINFORCE EDUCATE

Upload: others

Post on 02-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBERSTRENGTH - Wombat Security€¦ · Wombat Security Technologies was born from research at the world-renowned Carnegie Mellon University where our co-founders are faculty members

CYBERSTRENGTHActionable Assessments of Security Knowledge

CyberStrength® is the first-of-its kind employee assessment solution that enables you to create, administer, and analyze the results of a custom security knowledge evaluation, all via our SaaS-based Security Education Platform.

Our comprehensive portfolio of questions cover a range of subjects, including safe interactions with emails, URLs, and websites; proper use of mobile devices and mobile apps; understanding and avoiding social engineering scams; and other behaviors that can negatively impact your people,

areas, data, and systems. You can also create your own questions to assess understanding of company-specific policies and the pervasiveness of known issues.

Assessments are a key part of the Wombat Continuous Training Methodology, which our customers have used to achieve up to a 90% reduction in successful phishing attacks and malware infections by implementing the continuous process of assess, educate, reinforce and measure.

What Is CyberStrength?

MEASUREASSESS REINFORCEEDUCATE

Page 2: CYBERSTRENGTH - Wombat Security€¦ · Wombat Security Technologies was born from research at the world-renowned Carnegie Mellon University where our co-founders are faculty members

What Can You Do With CyberStrength?• Use our library of more than 150 questions to build a broad assessment across several cyber security topics areas and evaluate employee knowledge.

• Create focused assessments on specific topics such as phishing, mobility, internet browsing, physical security, social networking, and much more.

• Assess employees’ understanding of topics addressed by simulated attacks to ensure you know about all vulnerabilities.

• Add custom questions that are specific to your policies, areas of weakness, or unique culture, or anything else you want to assess.

• Make CyberStrength assessments a part of your continuous security training program so that you can regularly measure and reduce your organization’s vulnerability to attack.

Page 3: CYBERSTRENGTH - Wombat Security€¦ · Wombat Security Technologies was born from research at the world-renowned Carnegie Mellon University where our co-founders are faculty members

The most important part of a CyberStrength assessment is the analysis of results. Wombat offers both high-level and detailed reports that show CyberStrength scores across

your organization. Every report can be exported to Excel or Word so that you can include the results in presentations to executive management and other interested parties.

Evaluating Your Organization’s CyberStrength

Assessment Report – Shows the overall score of the assessment across the users who have completed it; the status of the assignment completion; scores by category; and scores by group. This gives you an at-a-glance view of strengths and weaknesses.

Risk Report – Each section of this report gives you the ability to drill down into detailed information about a range of assessment results, including scores by group, lowest overall score by group, most missed questions, and lowest scores by person. You can use this analysis to tailor your follow-up training efforts and focus on the most important topics in different areas of your organization.

Page 4: CYBERSTRENGTH - Wombat Security€¦ · Wombat Security Technologies was born from research at the world-renowned Carnegie Mellon University where our co-founders are faculty members

What Can CyberStrength Do For You?

Why Wombat?

MEASUREASSESS REINFORCEEDUCATE

Wombat Security Technologies was born from research at the world-renowned Carnegie Mellon University where our co-founders are faculty members at the CMU School of Computer Science. In 2008, they led the largest national research project on combating phishing attacks with a goal to address the human element of cyber security and develop novel, more effective anti-phishing solutions.

These technologies and research provided the foundation for our product solutions as well as our Continuous Training Methodology. The methodology, comprised of a continuous cycle of assessment, education, reinforcement, and measurement, has been shown to deliver up to a 90% reduction in successful phishing attacks and malware infections.

About Wombat and Our Continuous Training Methodology

Contact Us: wombatsecurity.com | [email protected] | 412.621.1484

© 2008-2015 Wombat Security Technologies, Inc. All rights reserved.00815CS

• Enables you to go beyond the scope of simulated attacks to get a broader understanding of your employees’ knowledge levels.

• Simplifies the assessment process by providing a library of more than 150 questions to choose from. You simply decide what topics you want to cover, who will receive which questions, when the assessment will be sent, and the due date for completion.

• Allows you to add customized questions that address specific policies or known issues.

• Provides detailed reports that allow you to benchmark, track, and trend user knowledge.

• Identifies your organization’s vulnerabilities, allowing you to effectively target your education efforts, reduce overall training time, and mitigate risk.

• Our award-winning Security Education Platform provides everything you need to deliver a complete, effective security awareness and training program.

• Customers that use our unique, effective Continuous Training Methodology have experienced up to a 90% reduction in successful phishing attacks and malware infections.

• Our methodology delivers a cohesive, consistent educational experience. Our training library includes 17 interactive modules in 13 languages – and it’s still growing.

• Our training and methodology are based on learning science principles, ensuring longer knowledge retention and behavior change.

• Comprehensive support services – before, during, and after your program launch – is included at no extra cost.