Proven Training for
Savvy Employees

Our security awareness training videos cover everything
from password development, social engineering,
preventing viruses and more!

Training That Gets

Results

The Secret Weapon Against Cyber Crime.
Industry Recognized Training Program.

Technology Isn’t Enough

Educate Employees To Fend Off Attacks
With A Fun Training Program That Works!

Get Results Fast!

Bolster Security Awareness Training With Our
Entertaining Training Videos Today.

InfoSec Training
Programs

Creating Security Training is No Simple Task.
Let the Experts Help!

Watch a Sneak Preview

Grab a Seat and Watch How Expertise and Entertainment Get Results

Security Awareness for the Legal Industry

Most organizations place a high focus on employing safeguards for their networks, but technology is only one piece of the equation. Organizations must effectively educate employees to fend off attacks. DDI can help you bolster security with SecurED®, the security awareness training program that delivers expert information with a dash of humor to make it fun and memorable.

No more boring PowerPoint® presentations! Employees can access training material anytime from virtually any device.

1-1  It works! A Ponemon institute study revealed that SecurED outperforms the alternative training intervention by 300% in long term gains.

1-1  Fun and Entertaining! The training was developed in collaboration with an Emmy® award winning comedy writer.

1-1  Underpinned by Security Expertise! Training includes 12 different information security hot topics to include security intelligence and best practices.

1-1  Easily Measure Success! Each training module includes test questions to help you track the “stickiness factor” required for effective retention.

1-1  Meet Your Global Needs! Training available in ADA-compliant and multi-language versions.

Save

ponemon-logo
SecurED® Gets High Marks
Security training has long been criticized for being boring, unengaging and lacking the ability to measure success. However, an independent analysis conducted by the Ponemon Institute shows that SecurED is proven relevant, enjoyable and gets the results essential for long term gains.

Download the Report…

Save

Save

Save

Save

“Within two weeks of having introduced SecurED, the Information Security office began receiving a multi hundred percent increase in requests for spam, phishing, and suspect web site reviews meaning that our employees had taken to heart the elements they learned in the training.”

– Jay Sitkin, Manager of Security Operations at Unisys

Training Topics Covered

Save

New Training Courses Available

Save

check-4 Secure Practices for The Internet of Things

The Internet of Things is the set of physical devices that are connected to the internet.  They collect and exchange data with each other as well as with humans, all with the goal of rendering our lives more efficient and more productive. Along with technological advancements comes the potential for increased security risks. In this module, employees will better understand the environment, infrastructure and IoT security risks and privacy concerns. Through best practices and tips for improved security, employees will learn the effective ways to apply the same security protection protocols on IoT devices as they would any other network attached equipment.

Save

Save

check-4 Defending Against Cyber Fraud

Cyber Fraud is the use of Internet services or software to deceive and defraud victims, both individuals and organizations, with a motivation of financial gain.  This training video will discuss ways to prevent cyber criminals from accessing your workplace to commit cyber fraud. From ransomware to wire fraud, employees will be educated on schemes and tactics used by cyber criminals and learn best practices for defending against these types of attacks.

Save

check-4 Compliant & Secure: HIPAA

Over the past several years, there has been a significant rise in criminal attacks against organizations with access to patient data as a result of the underground value of protected health information (PHI) and personal identifiable information (PII). In this training video, employees will learn the security protocols surrounding the Health Insurance Portability and Accountability Access (HIPAA) and gain insight into regulations and information security best practices for complying with HIPAA to defend against a breach and to bolster the security of patient data.

Save

check-4 Executive Cyber Defense

We believe that hacker success rates will increase and organization leadership must keep their guards up at all time to reduce the risk of a security breach that can result in a devastating outcome. Research has proven that Executive level support is essential to building a culture of security. This training video, specifically designed for executive management, presents best practice recommendations on how to defend against an attack aimed at Executives and their families, as well as approaches to reduce risk by creating a high level of security awareness across the organization.

Save

check-4 Compliant & Secure:  PCI

It is no secret that, over the past several years, there has been a significant rise in credit card fraud resulting from data breaches caused by internet attacks against merchants and banks. In this module, employees will learn the importance of the Payment Card Industry (PCI) standards to prevent cyber theft, and how to go beyond compliance to ensure your organization is proactively adhering to standards and mitigating the risk of a data breach.

Save

Save

check-4 Defending the Security Landscape

Cyber security breaches are happening at an alarming rate.  Consumers and businesses alike are faced with the challenge of ensuring they are investing in safe technologies and keeping apprised of the various ways in which they may be compromised. In this training video, the state of security is addressed by presenting consequences of a breach, common motivations of hackers and methods of attacks utilized to gain access to sensitive data. From Phishing to physical security, this training is an introduction to the various tactics used to infiltrate organizations and helps educate employees on how to fight the ongoing battle to protect your organization’s most valuable assets.

 

Save

Save

Save

Save

check-4 Password Development & Security
The recent security breaches making headlines in the news and security flaws being announced underscore the need for employees to understand the importance of secure passwords.

Save

check-4 Onsite Social Engineering
Train your employees not to be taken advantage of by scammers who are using human nature to get their foot in the door and their hands on sensitive information.

Save

Save

check-4 Remote Social Engineering
One opened email; One clicked link. Simple acts that could lead to devastating consequences. Train your employees how to spot easily deployed attacks that are highly effective at gaining access to corporate data.

Save

Save

check-4 Mobile Device Security
Employees utilizing personal iPhones, iPads and other devices to conduct business are no longer the exception but now the rule. However, convenience can come at a price. Train your employees on proper security on the go.

Save

Save

check-4 Social Media Dangers
Friending, following, tweeting, checking in and linking up… In today’s ever connected world, people all over the globe are utilizing social media. Train your employees on how to socialize more safely.

Save

Save

check-4 Safe Web Browsing
Online pop-ups, deceptive links and clickable graphics can all lead to spyware and other potentially dangerous traps. Train your employees on common tactics used by cyber criminals and how to avoid scams.

Save

Save

check-4 Installing Software from Unknown Sources
New software is enticing but can also wreak havoc in the office. Learn how to properly use software and how to avoid unknown or unsolicited programs or files that could lead to a breach.

Save

Save

check-4 Preventing Virus & Malware Outbreaks
The complexity of recent virus attacks demonstrates the need for training and ongoing education. In this training module learn about antivirus technologies and ways to detect malware.

Save

Save

check-4 Using Cloud Services Safely
A security storm could be brewing. Train your employees on how to be responsible for selecting a cloud provider.

Save

Save

check-4 Physical Security
Does your organization have the wrong kind of ‘open door policy?’ Are social engineers getting access to sensitive information? From piggy backing to dumpster diving, train your employees on what to be looking for to help defend against an attack.

Save

Save

check-4 Securing Protected Data
Protecting sensitive information is the objective for all security measures. Learn the fundamentals of ways employees can work together to protect personal and customer data.

Save

Save

check-4 Acceptable Use of Computer Systems
Go beyond common sense and outline the importance of the company computer use policy in this entertaining security training module.

Save

Save

Save

Save

Save

Save

Save

Save

Save