Training for the human factor
WorkWise™ is an online training focusing on recognizing the importance of cyber security awareness,
changing behavior toward best practices, and understanding the impact of actions at an individual level.

RELEVANT
The biggest liability regarding cyber security… human error. The clear lesson here is that people matter as much as, if not more than, technology. Endorsed by leading industry experts, WorkWise™ continues beyond awareness by including practical and smart best practices. The 7 topics of awareness training can be completed in 1.5 hours with each topic averaging 12-15 minutes.
ACCESSIBLE
It’s as easy as signing in to training from any device on any browser! A completely cloud-based solution which means no extra software to install or maintain.
Desktop
Laptop
Tablet
Chrome
Internet Explorer
Edge
Firefox
Safari
PRACTICAL
Where “ease of use” actually means the training is easy to use. With automatic bookmarking, the training provides the flexibility to start and stop at a moments notice. Need to sign in from a different device or different browser? No problem.
REPORTING
Keep track of learner progress through report features embedded within the training. From “Not Started” through “Completed”, real-time learner progress is available whenever you need it. Run summary reports from a high-level view or on specific target actions.
VERIFIABLE
WorkWise™ isn’t your average “sign in then read your email until it’s over” type of training. Each learner is required to complete a final exam with a passing score. What happens if they don’t pass? We like to say: they are provided the opportunity to retake the final exam again!
WORKWISE TRAINING TOPICS
7 Topics Designed for the Adult Learner
InfoSec 101
Defining your roleDefending your information
MALICIOUS ATTACKS
Identifying Types of AttacksTaking Proactive Actions
PASSWORDS
Password ManagementEncryption
CONNECTIVITY
Information SharingSecure/Insecure Connections
DEVICES
Storage, Printers, Fax MachinesDiscarding Old Equipment
SOCIAL ENGINEERING
Identifying Types of ScamsMaintaining a Safe Environment
INCIDENT REPORTING
Common MisconceptionsRecognizing and Reporting
WHAT THEY SAY...
What our clients are saying about us?
We no longer let anyone into the building, especially the networking room, unless we verify with someone internally first. The training had specifically highlighted this aspect and how easy it was for someone to gain access to sensitive areas in our business. It has become so easy for people to fake who they are using social engineering.
I cannot say enough about the ease of completing the training. The bookmarking ability allowed me to finish training without needing to re-do any sections because of my various work interruptions. I have also learned quite a few good techniques to keep my data secure as well.
My entire department has taken training and we have begun to implement so many important elements that your training had provided. My team is now far more suspicious of emails and are able to better spot phishing attempts as well.