Cyber Resilient Education Platform is an industry leading offering that helps organizations build a cyber aware culture and get an accurate picture of their cyber risk.
Organizations have spent the last decade building and ensuring IT systems are secure. For this reason, hackers have changed their strategy to target employees through social networks, phishing links, malware attachments and social engineering to name a few.
CTRL’s Cyber Resilient Education Platform tests staff members via phishing simulations, trains them using interactive content and measures their performance as they up-skill their understanding of cyber risk.
From an organizational standpoint, the education platform assists in addressing overall cyber risks as it relates to staff. It enables organizations to assess their cyber risk posture, and report on the progress they are making to reduce risk. In addition, organizations can rely on the education platform to better understand how to navigate the risk and compliance landscape via best practices checklists, legal templates and policy templates.
Why Is This Important
- Build a cyber resilient culture to reduce human risk.
- Activate your staff as your first line of defense against cyber risks.
- Measure risk reduction through reports and simulations.
What information will I need to provide to define the scope of the engagement?
Total number of staff which will be enrolled into the Education Platform.
How long does it take to on-board my organisation onto the Cyber Resilient Education Platform?
Approximately 1 hour
What is the level of involvement and support required from my team?
Minor technological changes are required as well as the training for the nominated Portal Administrator. All of which take approximately 1 hour.
How is my data handled?
Education Platform information is stored in a secure Australian Datacenter. No data is held outside of Australia.
What do I do once the platform is live?
Portal Administrators simply check in on the platform to see how staff are performing with training and phishing attacks. They can then take internal action against the poor performing staff to improve the security posture.