Productivity & Collaboration
Cybercriminals targeting people, not systems have fully commercialized their operations and systems so that they can target people at scale, predominantly through Phishing Emails, SMiShing (SMS Phishing), Vishing, malicious websites, and software. In over 70% of conﬁrmed security incidents, each was started by the actions of a staff member who had been tricked by a cybercriminal. Staff need help in becoming more aware in how to protect themselves at home and on the corporate network.
Cybercrime isn’t going away
No plan or strategy can survive a bad culture
Policies are as good as they are known
Internal threats are the most potent and lethal
Liquid’s security training and awareness solutions are designed to assist our clients to enhance what we refer to as the ‘Human Firewall’ this is facilitated by simulated phishing attacks whereby the solution has been designed to mimic real world phishing attempts, all with the intention of building awareness among users.
Cloud enabled platform – scalable
Ability to execute phishing simulations – as part of a security awareness campaign
Readily available training courses and related content (e.g., videos) to initiate security awareness campaigns
Customized content created by an organization can be added to security awareness campaigns
Provides for on-going knowledge assessments to ensure targeted training and engagement
Includes comprehensive governance, risk and compliance reporting to relevant stakeholders
Significant differentiator in its ability to provide Real-Time Intervention
Risk Mitigation – To prevent compromises that are related to users acting/initiating malicious attacks due to negligence/lack of awareness
Compliance Requirement – To align with industry cyber security standards such as ISO27001 or NIST CSF and/or legislation and regulatory requirements such as POPIA, GDPR, etc. Depending on the business practices there may also be further requirements specified such as PCI DSS.
Adherence to Governance – Staff need to be informed of cyber security policy requirements and their obligation thereof.
Enables compliance to legislative, regulatory, and contractual requirements
Preventive measures are far cheaper than reactive measure
Breaches are detrimental to your brand equity
Promotes adherence to acceptable use policies