90% OF CYBER ATTACKS ARE SUCCESSFUL DUE TO HUMAN ERROR

 

BCyber

NEXT-GEN SECURITY AWARENESS TRAINING

 

Help build a cyber aware culture, reduce your human risk and deliver meaningful reports to demonstrate return on investment.

  • Any existing controls?
  • Training?
  • Market review?
  • Previous incidents? 
  • MSP?
  • Staff?
  • Location?
  • Board reporting?
  • Business controls? 
  • Cyber concerns?

CYBER SECURITY LANDSCAPE

  • Ransomware attacks occur every 14 seconds.
  • Security breaches have increased by 67% year on year
  • 60% of SME's that experience a breach go out of business within 6 months
  • $280k is the average cost to an SME from a cyber incident 

"Represents the greatest transfer of economic wealth in history,  and will be more profitable than the global trade of all major illegal drugs combined"

Damages to reach $6 trillion annually.

 

BUSINESSES ARE THE NEW TARGETS

Passwords

2012: $0.01

2017: $0.0001

Credit Cards

2015: $25.00

2017: $4.00

$280,000

Consumers

Business

2009

2010

2011

2012

2013

2014

2015

2016

MOST VICTIMS ARE ACCIDENTAL TARGETS

Targeted Attack Launched

Credential Stuffing

Phishing Attacks

Personal Devices

Attacks launched towards a large volume of targets

OF ALL SUCCESSFUL CYBER ATTACKS ARE CAUSED BY HUMAN ERROR.

90%

Source: IBM Cyber Security Intelligence Index

 

  • Poor password hygiene
  • Unable to identify phishing emails
  • Poor web browsing behaviour
  • Unsafe remote access
  • Information classification
  • Email / SMS spoofing
  • Ransomeware response

70% of employees don't understand cybersecurity

THE PATH OF LEAST RESISTANCE

Human Emotions: Pay Rise?

Firewalls

MDM

SOCs

Antivirus

VPN

2FA

HOW DO WE BUILD A

HUMAN FIREWALL?

IT'S ALL ABOUT AWARENESS

The risks of re-using passwords?

Do all staff know...

How to browse the internet safely?

How to prevent ransomware from spreading?

Identify a spear phishing campaign?

What malware and ransomware are and associated risks?

How to secure their personal devices?

What Business Email Compromise is?

How GDPR impacts your business?

What information security is and how to treat different data?

How to use public WiFi securely?

How to create a safe password?

What social engineering is and how it is a risk to your business?

EXAMPLE ATTACK

WHAT WE BELIEVE...

100K+ Learners over 30 industries have taught us a few lessons! 

1: IT'S ABOUT THE PEOPLE

Fun content

Engaging topics

Relevant to them

Fosters inquiry 

"An organisation does not make its people cyber aware; its people make the organisation cyber aware"

2: IT'S NOT ABOUT TICKING THE BOX

It's about engagement

Trend monitoring

Human risk scores

Meaningful reports 

"Automated regular reporting that provides  clear, actionable data for management and boards"

3: SUCCESS IS SEEN AROUND THE WATER COOLER

Safe & open culture

Confident knowledge 

Their role

 

 

"A cyber aware culture is where staff  take their own

digital footprint seriously and what safe behaviour to model"

EFFECTIVE SECURITY AWARENESS 

1. BUSINESS

2. TRAINING

3. PHISHING

A good security awareness program starts with clear policies & procedures for staff to follow.

Changing culture requires engaging, fun and informative training or a regular basis.

Simulate real world cyber attacks to test and measure and fix effectiveness of training.

4. REPORTING THAT MEANS SOMETHING

Get clear actionable reports to measure and identify at-risk areas of the business. Export data for meaningful management and board reporting.

BCyber

COMPLETE END-TO-END

SECURITY AWARENESS SOLUTION

 

BUSINESS

Cyber Security Health Check

Cyber Risk Dashboard

Ready To Edit Policy Templates

Security Awareness Posters

TRAINING

40+ Security Awareness Courses

Courses covering all cyber topics

Access from any device, anytime.

Learning outcome assessments

TRAINING TOPICS

We have an extensive library of security awareness training courses covering all areas of cyber security. You can determine your own training schedule based on your organisations specific risk profile.

TRAINING YOUR STAFF WANT TO WATCH!

3-4 minutes in length

Based on real events

Relate to the individual

Foster inquiry

PHISHING

100+ Spear Phishing Templates

Real world simulations

Automated delivery and reporting

At risk staff auto-enrol training

Granular Risk Reporting

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

Single Metric To Measure Change

Detailed drill-down reporting

Training gamification

Exportable raw data source

DON'T BECOME AN ACCIDENTAL TARGET

BUILD A CYBER SAFE CULTURE

&

Automated BCyber Process

The BCyber process is an easy to follow cyclical process which ensures an effective security awareness program is implemented to change culture and instinctive behaviors

1. POLICIES AND PROCEDURES

An effective security awareness program starts with strong policies and procedures. It is critical that the organisation has clearly defined policies for the training to reinforce.  

2. BASELINE PHISHING TEST

By performing a baseline phishing test, you have results to compare and track the success of your program. This baseline test also identifies at-risk departments and individuals.

Our short engaging training is delivered online for staff to watch at any time from any device. Learners progress is tracked and at-risk learners identified.

3. REGULAR AWARENESS TRAINING

Perform real-world phishing attacks on staff to demonstrate in a safe environment what a real attack looks like and promote safe email behavior. 

4. SPEAR PHISHING SIMULATIONS

5. MEASURE AND REDUCE RISK

Measure results on a monthly basis and auto-enrol at-risk staff including those who have failed phishing simulations. Track your progress over time with the cyber risk dashboards.