What they Say?

Companies such as Wombat Security Technologies are experts in the training delivery field, and they specifically provide a market-leading solution for continuous security education that creates employee behavior change. Select a training partner, like Wombat, that dedicates research time and money to identifying current and emerging threats that will be encountered and in delivering scalable solutions that make it easy for training program administrators to assess areas of user knowledge weakness and then target education programs to the subjects and people most at risk. This is a great way to get a quality program started, show a quick ROI, and then grow the program over time.

- David Monahan, Security Analyst at Enterprise Management Associates


Gauge Knowledge and Susceptibility to AttackRequest For Demo


How susceptible is your organization to phishing emails, smishing messages, social engineering scams, and other physical and cyber security threats? If you’re in charge of security awareness and training and you’re not able to pinpoint your organization’s areas of vulnerability, this lack of knowledge is a ticking time bomb.

Our security assessment tools allow you to identify knowledge gaps, the employees who are most likely to fall for scams, and the areas of your organization that are most susceptible to attack.

CyberStrength® Knowledge Assessments, ThreatSim® phishing simulations, SmishGuru® mock smishing messages, and USBGuru® simulated attacks are the key first steps in our Assess, Educate, Reinforce, Measure security awareness and training methodology. Pair our CyberStrength® assessments with our simulated attacks for a 360-degree view of your organization’s vulnerabilities

Engaging Employees Through Interactive Training

Each of our modules offers 10 to 15 minutes of interactive training about a specific security topic. Our development and design processes use key Learning Science Principles and employ methods that have been proven to be more effective than once-a-year training presentations and videos that do not allow for interaction. All of our modules are available in multiple languages, which allows multinational organizations to deliver effective and consistent training to employees around the globe.

Our modules engage users through hands-on decision-making, improving knowledge retention and facilitating longer-term behavior change. In addition to this purpose-written, research-based educational content, our Training Jackets allow you to add custom and personalized content to the beginning and end of each module. You can add notes about specific organization policies, attach a training completion certificate, include a policy acknowledgement screen, and more.

As your employees progress through our training, comprehensive reporting functions allow you to gather the intelligence you need to effectively manage and tailor your efforts. We provide a variety of reports that give you both high-level and granular looks at your employees’ results.

Wombat currently provides the following training modules:

  • Email Security or Anti-Phishing Phyllis - recognize bait and traps commonly found in phishing emails and spear phishing attacks
  • Data Protection and Destruction - safely use portable storage devices and media
  • Password Security - the difference between strong and weak passwords, show and test two methods for creating strong passwords, and explain best practices for keeping passwords safe
  • Safe Social Networking - safely share and interact with others on social networking sites
  • Security Beyond the Office - keep your data, network, and equipment safe when working outside the office
  • Security Essentials - introduce users to security issues that are commonly encountered in day-to-day business and personal activities. An excellent option for introducing new hires to simple, effective best practices.
  • Social Engineering - recognize and avoid common social engineering techniques and keep your people, areas, and assets secure
  • URL Training or Anti-Phishing Phil - learn how URLs are constructed, URL warning signs, and how to identify and avoid malicious links
  • Mobile Device Security - learn the importance of physical and technical safeguards, as well as ways to improve the security of their mobile communications and connections
  • Mobile App Security - how to research app components and the implications of dangerous permissions, which can help them judge the reliability and safety of mobile applications prior to downloading
  • Physical Security - introduces key components of physical security and helps your employees understand their role in maintaining a safe and secure work environment
  • Safer Web Browsing - learn how to identify potentially dangerous URLs, avoid malware and virus downloads, and spot Internet scams
  • PCI DSS - helps your staff better manage credit card data; understand PCI DSS requirements; securely manage records and accounts; and recognize and act upon security breaches
  • Personally Identifiable Information (PII) - Employees will learn how to identify PII; best practices for handling, storing, and sharing PII; and the fundamental actions to take in the event of a PII breach
  • Protected Health Information - Employees will learn about PHI identifiers and receive practical guidance for using, disclosing, transmitting, and storing PHI.

Our Partners

  • partner_1.jpg
  • partner_2.jpg
  • partner01-1.jpg
  • partner02.jpg
  • APICS_ChannelPartner_Horz.jpg
  • ITIL
  • ITIL