There is perhaps no topic more relevant to the Halloween season than social engineering. Like those who revel in the spirit of Halloween, social engineers are all about the elements of disguise and surprise. Though, at heart, social engineers exhibit ghoulish tendencies, they would never show up on your doorstep dressed to scare. Instead, they will make every attempt to lead you to believe they are someone honest and trustworthy.
SaaS-Based Security Awareness and Training for End Users
Our Continuous Training Methodology
Our unique Assess, Educate, Reinforce, Measure training methodology combines the four key components of successful cyber security awareness and training programs.
Customers who have used this cyclical approach have experienced up to a 90% reduction in successful external phishing attacks and malware infections.Read the Case Studies
Evaluate Knowledge, Identify Vulnerabilities
An important first step in comprehensive cyber security awareness and training for employees is to assess your employees’ knowledge and your organization’s areas of susceptibility.Learn More
Use our scenario-based CyberStrength® Knowledge Assessments to gauge your staff’s understanding of a variety of cyber security topics.Learn More
Choose our customizable ThreatSim®, SmishGuru®, and USBGuru® simulated attacks to identify vulnerabilities to pervasive threat vectors without exposing your organization to an actual attack.Learn More
Deliver Targeted, Impactful Training
Our interactive training modules are the key to educating your employees about security threats in the workplace and beyond. These 10- to 15-minute modules allow users to learn by doing, engaging them through hands-on decision-making.
Email Security / Anti-Phishing
Mobile Device Security
Change Behavior, Reduce Risk
Our educational approach improves knowledge retention, creating longer-term behavior change. It’s also flexible: You can add customized content to highlight known issues, communicate policies, and more.Learn More
Create a Culture of Security
It’s important to reinforce best practices learned in order to keep cyber security top-of-mind for your employees.
Our PhishAlarm® email reporting add-in enables employees to put their knowledge to use and report suspected phishing emails with the click of a button.
In addition, our portfolio of Security Awareness Materials allows you to highlight key messages and reward positive behaviors within your workplace.Learn More
The most effective training programs are flexible enough to adapt and change according to your needs. Our reporting tools allow you to gather powerful analytics about your organization’s strengths and weaknesses, calculate results, and plan future training accordingly.
Not sure which assessment and education components to select for your cyber security training programs? Our suggested plans identify the Wombat products that will help you target specific threat vectors.
The Anti-Phishing Training Suite combines simulated phishing attacks, our unique Auto-Enrollment feature, and three interactive training modules to help you reduce phishing risks. Learn More
Use our CyberStrength assessments and simulated attacks to evaluate susceptibility, and follow with training modules that help your users identify social engineering scams and react appropriately. Learn More
Healthcare settings provide their own unique challenges. Use our healthcare-focused assessments and short, interactive training to build an effective program. Learn More
What Others are Saying...
“We’ve been using Wombat’s PhishAlarm product for some time and can already see the positive impact it’s having on our organization. PhishAlarm easily replaced antiquated suspicious email reporting with a consistent and user friendly process that positively affected employee behavior.”
“We selected Wombat because they offer a comprehensive cyber security preparedness platform. Wombat’s platform enables us to assess internal risk and target training to employees who need it most, thereby strengthening our security profile.”
Wombat Security Blog
Security Spotlight: Avoiding Election Scams
As the U.S. enters the final weeks of a heated presidential election race, voters are being bombarded with political messages – and a slew of election-related scams. As November approaches, we expect to see a continued rise in political phishing emails, suspicious donation requests, and voter registration and survey scams.
The Better Business Bureau (BBB) has cautioned voters against these types of scams, which occur every election cycle because they continue to work. While educating yourself on the candidates is important during any election, it’s just as critical to stay on top of potential security threats at the polls and at home.
Wombat Security Named a Leader for Third Consecutive Year
We are honored and excited to confirm that Wombat Security has been positioned by Gartner, Inc. as a Leader in the 2016 Magic Quadrant for Security Awareness Computer-Based Training.* This is the third year in a row that we’ve been placed in the Leader quadrant, and our position within the quadrant reflects our clear commitment to excellence and our desire to continue to elevate our products and our platform.
Three Mobile Security Habits to Implement Today
In relatively short order, mobile devices have become fixtures in our daily lives. Nothing makes this more clear than the fact that my parents have figured out texting and how to take — and send — a picture with their smartphone. It’s rather amazing to think about what is possible today that wasn’t possible just a few years ago.
But as Uncle Ben Parker of Spider-Man fame cautioned, “With great power comes great responsibility.” (That’s totally who said it. You can look it up.) Our devices help us connect, work, shop, and play — and to enable that, they hold a lot of personal information. Protecting our devices is akin to protecting ourselves.
It’s time to banish that alter ego who sits on your shoulder and tells you that things like identity theft can’t happen to you. Instead, power up by making the following mobile security tips a part of your cybersecurity arsenal.