Security AwarenessNow! is a CyberSecurity Training Service provided by InternetNow.

Security Awareness Training

What is Security Awareness Training?

SECURITY AWARENESSNOW!, is a fully managed automated cybersecurity training service that is designed to prepare your employees against today’s sophisticated cyber-attacks.

  • Delivered at the ease of their workstations
  • Monthly simulated phishing attacks
  • A highly interactive web-based training module
  • Short assessments to measure the level of absorption
  • Detailed reports, showing stats and graphs for both training and phishing, ready for management

This ensures your employees understand the fundamental mechanism of spam, phishing, malware social engineering and etc. Thus, providing a wholesome cybersecurity training experience.

Why Security AwarenessNow!

icon3

Compliancy

Risk Management in Technology (RMiT) policy by Bank Negara Malaysia (BNM)

Under Section 13: Internal Awareness and Training, it specifies that:

RMiT Policy


ISO 27001/27002:2013 Requirements by International Organization for Standardization

Under Clause 7.2.2: Information Security Awareness, Education and Training, it specifies that:

'All employees of the organization and where relevant, contractors should receive appropriate awareness education and training and regular updates in organizational policies and procedures, as relevant for their job function’.

View ISO 27001:2013 Requirements
View ISO 27002:2013 Requirements

icon4

Malware: Ransomware

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer - usually through an email and can take the form of executable code, scripts, active content, and etc

icon10

Social Engineering

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software. For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak).

Service Overview

Many financial institutions are still using the talk and chalk method (traditional method) to create awareness amongst their employees, that aren’t engaging enough to truly educate them.

Our Continuous Training approach informs users about best practices and teaches users how to employ these practices when they face security threats.

A continuous cycle of assessment, education, reinforcement, and measurement maximizes learning and lengthens retention. Thus providing the flexibility to:

  • Evolve your program over time
  • Identify areas of susceptibility
  • Deliver targeted training when and where it’s most needed.
icon5

Service Overview

Many financial institutions are still using the talk and chalk method (traditional method) to create awareness amongst their employees, that aren’t engaging enough to truly educate them.

Our Continuous Training approach informs users about best practices and teaches users how to employ these practices when they face security threats.

A continuous cycle of assessment, education, reinforcement, and measurement maximizes learning and lengthens retention. Thus providing the flexibility to:

  • Evolve your program over time
  • Identify areas of susceptibility
  • Deliver targeted training when and where it’s most needed.
icon5

STEP 1

ASSESS

We start with the Assess stage by measuring the baseline of the current awareness level - via Knowledge Assessment (Quiz) and Simulated Phishing Attack.
Quiz-demo
icon8

Phishing

Lure targeted user to click on a link in an email

icon11

Credential Harvesting

Lure targeted user to enter credentials into a fake website
Note: No paswords are collected

icon1

Attachment

Lure targeted user to open an attachment within an email

Netflix-phishin-demo
Microsoft-demo

STEP 1

ASSESS

We start with the Assess stage by measuring the baseline of the current awareness level - via Knowledge Assessment (Quiz) and Simulated Phishing Attack.
Quiz-demo
icon8

Phishing

Lure targeted user to click on a link in an email

icon1

Attachment

Lure targeted user to open an attachment within an email

icon11

Credential Harvesting

Lure targeted user to enter credentials into a fake website. Note: No paswords are collected

Netflix-phishin-demo
Microsoft-demo

STEP 1

ASSESS

We start with the Assess stage by measuring the baseline of the current awareness level - via Knowledge Assessment (Quiz) and Simulated Phishing Attack.
icon8

Phishing

Lure targeted user to click on a link in an email

icon1

Attachment

Lure targeted user to open an attachment within an email

icon11

Credential Harvesting

Lure targeted user to enter credentials into a fake website. Note: No paswords are collected

Quiz-demo
Netflix-phishin-demo
Microsoft-demo

STEP 2

EDUCATE

Based on the data collected in the Assess stage, we will devise an online training program consisting of Interactive Online Training modules (which focus on practical exercises and games). These 10- to 15-minute modules give users the opportunity to understand the types of risks they might encounter and recognize how their actions can have a positive impact on the safety and security of corporate and personal assets.
icon6

Monthly Simulation

This is done on a consistent basis which makes safety the top priority in your employees' mind, ensuring they are always on the lookout for cyber threats while surfing the Internet or going through their emails.

icon7

Assessments

Short Quiz/Test after training helps ensure that your employees understand the basic mechanisms of the training modules and are always prepared.

STEP 2

EDUCATE

Based on the data collected in the Assess stage, we will devise an online training program consisting of Interactive Online Training modules (which focus on practical exercises and games). These 10- to 15-minute modules give users the opportunity to understand the types of risks they might encounter and recognize how their actions can have a positive impact on the safety and security of corporate and personal assets.
Online learning can be automatically assigned for those that fail Monthly Simulation and those users who don't exhibit the desired level of proficiency for a Just-In-Time (JIT) training - immediate training for those that need it.
icon6

Monthly Simulation

This is done on a consistent basis which makes safety the top priority in your employees' mind, ensuring they are always on the lookout for cyber threats while surfing the Internet or going through their emails.

icon7

Assessments

Short Quiz/Test after training helps ensure that your employees understand the basic mechanisms of the training modules and are always prepared.

STEP 3

REINFORCE

Our Security Awareness Materials — a library of images, posters, articles, and videos — help you emphasize best practices and positive behaviors within your workplace. By making these message more visible and more recognizable, you reinforce your training and help employees retain their knowledge.

STEP 3

REINFORCE

Our Security Awareness Materials — a library of images, posters, articles, and videos — help you emphasize best practices and positive behaviors within your workplace. By making these message more visible and more recognizable, you reinforce your training and help employees retain their knowledge.

STEP 3

REINFORCE

Our Security Awareness Materials — a library of images, posters, articles, and videos — help you emphasize best practices and positive behaviors within your workplace. By making these message more visible and more recognizable, you reinforce your training and help employees retain their knowledge.

STEP 4

MEASURE

The methodology relies heavily on in-depth reporting, by providing stats and graphs for both training and phishing.
icon9

Phishing Simulation

Number of employees that opened dangerous attachment, clicked on a phishing link, read the training message completely and etc.

icon12

Online Learning Module

Number of employees who started the training, those that completed, those in progress.

icon2

Assessments

The scores by each staff, department or company as whole.

STEP 4

MEASURE

The methodology relies heavily on in-depth reporting, by providing stats and graphs for both training and phishing.
icon9

Phishing Simulation

Number of employees that opened dangerous attachment, clicked on a phishing link, read the training message completely and etc.

icon12

Online Learning Module

Number of employees who started the training, those that completed, those in progress.

icon2

Assessments

The scores by each staff, department or company as whole.

STEP 4

MEASURE

The methodology relies heavily on in-depth reporting, by providing stats and graphs for both training and phishing.
icon9

Phishing Simulation

Number of employees that opened dangerous attachment, clicked on a phishing link, read the training message completely and etc.

icon12

Online Learning Module

Number of employees who started the training, those that completed, those in progress.

icon2

Assessments

The scores by each staff, department or company as whole.

SAT-Diagram
An example of 1 year training programme
SAT-Report
In-Depth Report
INTERNETNOW TEKNOLOGI SDN BHD (721490-V)
2F-18 & 19, Pusat Perdagangan IOI, Persiaran Puchong Jaya Selatan,
Bandar Puchong Jaya, 47100, Puchong, Selangor.

Phone : +603 - 8075 2050
Fax     : +603 - 8075 2686
Copyright © 2019 InternetNow Teknologi Sdn Bhd and Security AwarenessNow! software. All rights reserved.