Because Prilock uses the latest technology to enroll, deliver, track, and report your security briefings and phishing tests we can reduce our program costs substantially while still offering you, and your employees, one of the best security awareness trainings available today.
Employees learn the psychology used by hackers in phish attacks, Ransomware, and social engineering so they see the attacks before they click.
Prilock's Security Awareness Training meets federal, state, and vendor standards for a comprehensive security awareness training and our phishing simulator contains Hundreds of phish that are used daily to trick and hack companies and employees just like yours. You can even build your own phishing to make them perfectly targeted to your industry or company.
You will also get emailed reports and access to your dashboard with real time analytics on all your activities and campaigns.
Phishing using email, instant messaging, or text messaging is the primary way companies and people are compromised.
As more people purchase Smartphones for both personal and business use, new threats continue to emerge.
Demonstrates multiple attacks via email and attachments and shows best practices when handling email and attachments.
Shows employees how log files and software are used to track unauthorized access or the copying of files.
Closing deals and meetings are the top priorities of most business travelers, but safety should be a priority, too.
Demonstrates several attacks used on social sites including examples of past attacks and schemes.
Wi-Fi is another difficult threat that needs to be addressed. We show the dangers of using public Wi-Fi, how to turn off your SSID notification, and things to watch with your smartphones and tablets.
We show how various attacks are used to steal login information and passwords, and demonstrate building strong, yet easy to remember passwords that are difficult for hackers to crack.
Seeing the latest email, social engineering, and in-person scams prepares users in the event that they actually become a target of one.
A non-technical lesson showing basics of how these tools are used to steal credentials and identification, different distribution tactics, and how to remove them.
Using your personal information like your shopping habits and recent social media activity against you, this tactic utilizes impersonating people or agencies that you trust in phone call and email scams.
Until people and employees understand they have value to hackers, they won't change bad habits. What you have, who you are, and who you know, all make you a target.
Security & Phish
1 Year Licenses
1-Click Setup for Full Years SAT & Phish Testing
|Meets All Reporting Compliance Mandates|
|Custom Admin Management Console|
|Phone, Email, and Instant Chat Support|
|Custom User Pages with Tools & Progress Reporting|
|Send A Friend A Phish Tool|
|Email Pwned Checker for Personal Emails|
|Dry Run-Admin Sees A Months Training In 3 Hours|
|Activity Sensitive Tutorial Videos|
|Dynamic Real Time Dashboard- Dark Mode|
|Comprehensive Campaign Reporting|
|Complete User History Analytics|
|International Location Mapping for Employees|
|Complete User Management from Admin Portal|
|Recent Login Activity|
|Gamification Built Into Training|
|Full Assessment Testing & Certification|
|Monthly Comprehensive Campaign Rpts Emailed|
COMPLETE PHISH TESTING
|Phish Simulator Custom Admin|
|Automated Phishing Campaigns|
|Unlimited Phish Testing|
|Clickers identified & Assigned- Corrective Training|
|Hacker Tells Shown in Failed Phish Tests|
|Access to Phishing Library|
|41 Phish Categories / Approx. 1,000 Phish & Growing|
|Build Industry Specific Custom Phish Emails|
|Tests, links, Attachments, Macros, Credential Entry|
|Start Your First Campaign in 10 Minutes|
PRO SECURITY AWARENESS TRAINING
|Comparable Training Services||N/A||N/A||1175||$2,050||$3,200||$4,800||$6,400||$7,250||$14,500|
|Buy Now||Buy Now||Buy Now||Buy Now||Buy Now||Buy Now||Buy Now||Buy Now||Buy Now|
Prilock's Security Briefing consists of 7 chapters with subtopics that will take approximately an hour to complete. It can be taken all at once, but we recommend students take it in 2 or 3 sections, the system will remember where they left off.
Along with the ability to automatically enroll, deliver, track, and report your security briefings and phishing tests, the system will also monitor and identify the users that are tricked by the phish. Once they have been tricked by 2 phish they are automatically enrolled in an injection training that reinforces what they missed and why it’s important they look for the Hacker Tells in EVERY email or text they receive.
When they complete the lessons, the students will take a 10-question assessment on the material they covered which requires they get 80% of the questions correct to pass. Then they can then print their Certificate of Completion.
Custom User Page
Prilock's Security Education Platform offers complete analytics on each employee's interaction with the system, tracking registration date, assignment date, start date, geographic location or work group, progress, assessment scores, total time, number of logins, and topics missed for enhanced training in those areas. This gives the administrator all the information they need to assess the compliance of each employee with your training objectives. It also provides a complete status report demonstrating your company's compliance with training regulations and requirements of insurance companies, regulators, and vendors.
These days vendors, insurance companies, major clients, state and federal agencies want to know your company and employees have been trained to safely handle their information. Prilock provides complete compliance reports demonstrating your employees have been trained and passed assessment exams that confirm they understand best practices to secure data. Employees can print their certificates for their personnel files and the company can provide completion reports to any authorities that need to see them. If there ever is an incident at your company it is important that you have taken steps to train your people to reduce penalties and fines that can be assessed.
Prilock uses a quick and fun game called the Hacker Challenge, to reinforce each set of lessons. Studies show learning and retention are improved when the subject matter is presented in different ways and in applicable situations. After each lesson you are presented with 2 scenarios of actual hacker attacks. Each time the hacker wins he takes $10,000 of your money; if you do the right thing, he gets nothing. By the end of the lessons the student has answered 14 questions without even realizing they are learning the best practices to avoid attacks. Gamification creates a focused, interactive, competitive, and immersive method to measure your new skills and progress accordingly, and it's fun to beat the Hacker at his own game!