User Awareness

The user of systems, applications, and data is an increasingly important component of a successful attack, often without being aware of it. To increase awareness among internal and external employees, we regularly conduct user awareness campaigns. The goal is to achieve lasting behavioral change through awareness. Motivation, current knowledge, and culture form an important foundation for this.
Woman holding tablet
Decorative

User Awareness Diensten

Awareness Assessment

To give organizations insight into their employees' security awareness, we have developed an assessment. We measure the initial motivation and knowledge level of the employee population and conduct a one-time phishing campaign. Based on the results and the specific characteristics of the organization, an Awareness program is created.

decorative
Security Awareness Game

To make employees playfully aware of their potential role in a possible attack, we have developed a game. The game's goal is to progress in three steps from knowledge to awareness to lasting behavioral change. Continuously training your employee population is essential - it's not for nothing that they're called the new security perimeter of your organization.

decorative
Security Awareness Dashboard

To provide management with the right steering information to focus on specific departments, teams, or other cross-sections of the organization, we have developed a dashboard. The Dashboard gives your organization insight into which components or individual employees need extra attention.

decorative
Phishing Integration

To regularly validate whether awareness has changed employee behavior, we conduct phishing campaigns. Sometimes targeting the entire employee population, sometimes a subset. Because we've integrated the phishing campaigns with the game, anyone who doesn't recognize a phishing attempt immediately receives a request to play several phishing modules.

decorative
Workshops

Part of the Awareness program includes workshops where we take time to demonstrate, for example, how easily an attack can be executed, or how manipulatively social engineering can be deployed. The goal is to experience up close how an attack can be carried out and how easily you can become an unintended link in it.

decorative
Escape Room

Simulating an attack is the best way to get employees working together as a team. To achieve this, we have developed several escape rooms that can be played at the client location. The emphasis is on the multidisciplinary composition of the teams, where IT, communication, operations, and management form the foundation.

decorative
Pub Quiz

Playing a pub quiz in a relaxed atmosphere under the guidance of spontaneous Quiz masters. Sometimes a serious subject like security awareness benefits from a "fun intermission." Relaxation is important for awareness, the first step toward behavioral change.

decorative
Content Creation

Because every organization is unique, we develop specific content for the Awareness program. A healthcare organization has different characteristics and challenges than a waste processor or financial institution. To develop this content, we have a content creation team that works with the organization to highlight specific use cases.

decorative
Digital Resilience for Students

More and more young people face the dangers that social media bring. To deploy our knowledge in a playful way for 7th and 8th graders, we have developed a program for primary schools. To create social impact, we invite our clients to sponsor schools and jointly contribute to a safer world for young people.

decorative
Consultancy

To achieve lasting behavioral change, we have a team of advisors who temporarily become part of your organization to initiate change from within. Recognizing behavior, making others aware of it, and initiating lasting behavioral change is human work that must start from within an organization. This makes it a specific discipline within security consultancy.

decorative

Improve Your Security Posture with Our Services

The foundation of our service begins with interest and deep understanding of your organization. This is the only way your organization can be properly protected.

Cyber Blue

Monitor critical business assets 24/7 against external and internal attacks with knowledge of business processes and attack strategies.
arrow

Cyber Red

Regularly validate security measures with penetration tests based on Black box, Grey box, and Crystal box methodologies.
arrow

IAM

Manage digital identities and access levels of employees, partners, and suppliers, minimize risks, and promote productivity.
arrow

GRC

Manage your security posture based on risks, standards, and measures. Advise on regulations and internal and external audits.
arrow

Network Security

Monitor network traffic for anomalous patterns, detect and neutralize attacks, and regulate network access to reduce the risk of unauthorized access.
arrow