Watch a Sneak Preview
Grab a Seat and Watch How Expertise and Entertainment Get Results
Grab a Seat and Watch How Expertise and Entertainment Get Results
Most organizations place a high focus on employing safeguards for their networks, but technology is only one piece of the equation. Organizations must effectively educate employees to fend off attacks. DDI can help you bolster security with SecurED®, the security awareness training program that delivers expert information with a dash of humor to make it fun and memorable.
No more boring PowerPoint® presentations! Employees can access training material anytime from virtually any device.
It works! A Ponemon institute study revealed that SecurED outperforms the alternative training intervention by 300% in long term gains.
Fun and Entertaining! The training was developed in collaboration with an Emmy® award winning comedy writer.
Underpinned by Security Expertise! Training includes 12 different information security hot topics to include security intelligence and best practices.
Easily Measure Success! Each training module includes test questions to help you track the “stickiness factor” required for effective retention.
Meet Your Global Needs! Training available in ADA-compliant and multi-language versions.
SecurED® Gets High Marks
Security training has long been criticized for being boring, unengaging and lacking the ability to measure success. However, an independent analysis conducted by the Ponemon Institute shows that SecurED is proven relevant, enjoyable and gets the results essential for long term gains.
New Courses Available – Pre Order Now
SecurED®, the industry recognized security awareness training program is getting even better with the Expanded Series. The new training courses take a fresh approach to security awareness training with a proven methodology.
Learn more about new SecurED packages and bundles.
“Within two weeks of having introduced SecurED, the Information Security office began receiving a multi hundred percent increase in requests for spam, phishing, and suspect web site reviews meaning that our employees had taken to heart the elements they learned in the training.”
– Jay Sitkin, Manager of Security Operations at Unisys
|Secure Practices for The Internet of Things
The Internet of Things is the set of physical devices that are connected to the internet. They collect and exchange data with each other as well as with humans, all with the goal of rendering our lives more efficient and more productive. Along with technological advancements comes the potential for increased security risks. In this module, employees will better understand the environment, infrastructure and IoT security risks and privacy concerns. Through best practices and tips for improved security, employees will learn the effective ways to apply the same security protection protocols on IoT devices as they would any other network attached equipment.
|Defending Against Cyber Fraud
Cyber Fraud is the use of Internet services or software to deceive and defraud victims, both individuals and organizations, with a motivation of financial gain. This training video will discuss ways to prevent cyber criminals from accessing your workplace to commit cyber fraud. From ransomware to wire fraud, employees will be educated on schemes and tactics used by cyber criminals and learn best practices for defending against these types of attacks.
|Compliant & Secure: HIPAA
Over the past several years, there has been a significant rise in criminal attacks against organizations with access to patient data as a result of the underground value of protected health information (PHI) and personal identifiable information (PII). In this training video, employees will learn the security protocols surrounding the Health Insurance Portability and Accountability Access (HIPAA) and gain insight into regulations and information security best practices for complying with HIPAA to defend against a breach and to bolster the security of patient data.
|Executive Cyber Defense
We believe that hacker success rates will increase and organization leadership must keep their guards up at all time to reduce the risk of a security breach that can result in a devastating outcome. Research has proven that Executive level support is essential to building a culture of security. This training video, specifically designed for executive management, presents best practice recommendations on how to defend against an attack aimed at Executives and their families, as well as approaches to reduce risk by creating a high level of security awareness across the organization.
|Compliant & Secure: PCI
It is no secret that, over the past several years, there has been a significant rise in credit card fraud resulting from data breaches caused by internet attacks against merchants and banks. In this module, employees will learn the importance of the Payment Card Industry (PCI) standards to prevent cyber theft, and how to go beyond compliance to ensure your organization is proactively adhering to standards and mitigating the risk of a data breach.
|Defending the Security Landscape
Cyber security breaches are happening at an alarming rate. Consumers and businesses alike are faced with the challenge of ensuring they are investing in safe technologies and keeping apprised of the various ways in which they may be compromised. In this training video, the state of security is addressed by presenting consequences of a breach, common motivations of hackers and methods of attacks utilized to gain access to sensitive data. From Phishing to physical security, this training is an introduction to the various tactics used to infiltrate organizations and helps educate employees on how to fight the ongoing battle to protect your organization’s most valuable assets.
|Password Development & Security
The recent security breaches making headlines in the news and security flaws being announced underscore the need for employees to understand the importance of secure passwords.
|Onsite Social Engineering
Train your employees not to be taken advantage of by scammers who are using human nature to get their foot in the door and their hands on sensitive information.
|Remote Social Engineering
One opened email; One clicked link. Simple acts that could lead to devastating consequences. Train your employees how to spot easily deployed attacks that are highly effective at gaining access to corporate data.
|Mobile Device Security
Employees utilizing personal iPhones, iPads and other devices to conduct business are no longer the exception but now the rule. However, convenience can come at a price. Train your employees on proper security on the go.
|Social Media Dangers
Friending, following, tweeting, checking in and linking up… In today’s ever connected world, people all over the globe are utilizing social media. Train your employees on how to socialize more safely.
|Safe Web Browsing
Online pop-ups, deceptive links and clickable graphics can all lead to spyware and other potentially dangerous traps. Train your employees on common tactics used by cyber criminals and how to avoid scams.
|Installing Software from Unknown Sources
New software is enticing but can also wreak havoc in the office. Learn how to properly use software and how to avoid unknown or unsolicited programs or files that could lead to a breach.
|Preventing Virus & Malware Outbreaks
The complexity of recent virus attacks demonstrates the need for training and ongoing education. In this training module learn about antivirus technologies and ways to detect malware.
|Using Cloud Services Safely
A security storm could be brewing. Train your employees on how to be responsible for selecting a cloud provider.
Does your organization have the wrong kind of ‘open door policy?’ Are social engineers getting access to sensitive information? From piggy backing to dumpster diving, train your employees on what to be looking for to help defend against an attack.
|Securing Protected Data
Protecting sensitive information is the objective for all security measures. Learn the fundamentals of ways employees can work together to protect personal and customer data.
|Acceptable Use of Computer Systems
Go beyond common sense and outline the importance of the company computer use policy in this entertaining security training module.