Training for the human factor

WorkWise™ is an online training focusing on recognizing the importance of cyber security awareness,
changing behavior toward best practices, and understanding the impact of actions at an individual level.

RELEVANT

The biggest liability regarding cyber security… human error. The clear lesson here is that people matter as much as, if not more than, technology. Endorsed by leading industry experts, WorkWise™ continues beyond awareness by including practical and smart best practices. The 7 topics of awareness training can be completed in 1.5 hours with each topic averaging 12-15 minutes.

ACCESSIBLE

It’s as easy as signing in to training from any device on any browser! A completely cloud-based solution which means no extra software to install or maintain.

  Desktop

  Laptop

     Tablet

  Chrome

  Internet Explorer

  Edge

  Firefox

  Safari

PRACTICAL

Where “ease of use” actually means the training is easy to use. With automatic bookmarking, the training provides the flexibility to start and stop at a moments notice. Need to sign in from a different device or different browser? No problem.

REPORTING

Keep track of learner progress through report features embedded within the training. From “Not Started” through “Completed”, real-time learner progress is available whenever you need it. Run summary reports from a high-level view or on specific target actions.

VERIFIABLE

WorkWise™ isn’t your average “sign in then read your email until it’s over” type of training. Each learner is required to complete a final exam with a passing score. What happens if they don’t pass? We like to say: they are provided the opportunity to retake the final exam again!

WORKWISE TRAINING TOPICS

7 Topics Designed for the Adult Learner

InfoSec 101
Defining your role
Defending your information
MALICIOUS ATTACKS
Identifying Types of Attacks
Taking Proactive Actions
PASSWORDS
Password Management
Encryption
CONNECTIVITY
Information Sharing
Secure/Insecure Connections
DEVICES
Storage, Printers, Fax Machines
Discarding Old Equipment
SOCIAL ENGINEERING
Identifying Types of Scams
Maintaining a Safe Environment
INCIDENT REPORTING
Common Misconceptions
Recognizing and Reporting

CYBER SECURITY: WHY SHOULD YOU CARE?

2017 MARCOM AWARD WINNER

WHAT THEY SAY...

What our clients are saying about us?

caret-down caret-up caret-left caret-right
VALLEY H.
I just finished your training program and found it to be very good, especially the format.  Because of the training, I am no longer doing some of the things I used to do.
DAVID R.

We no longer let anyone into the building, especially the networking room, unless we verify with someone internally first. The training had specifically highlighted this aspect and how easy it was for someone to gain access to sensitive areas in our business. It has become so easy for people to fake who they are using social engineering.

MICHAEL T.

I cannot say enough about the ease of completing the training. The bookmarking ability allowed me to finish training without needing to re-do any sections because of my various work interruptions. I have also learned quite a few good techniques to keep my data secure as well.

MARY P.

My entire department has taken training and we have begun to implement so many important elements that your training had provided. My team is now far more suspicious of emails and are able to better spot phishing attempts as well.