Welcome!

News Feed Item

Wombat Security Adds Security Awareness Materials to Provide One Stop Shopping for Cyber Security Education

Wombat's Continuous Security Awareness and Education Solution Now Includes Awareness Materials, a Library of Assessments, Interactive Training Modules, and Reports Measuring End User Cyber Security Knowledge

PITTSBURGH, PA--(Marketwired - March 25, 2014) - Wombat Security Technologies (Wombat) today announced that it is adding awareness materials to its comprehensive security education and training offering. In addition to Wombat Security's software solutions for assessing and training end users, Wombat now offers security awareness materials to reinforce these lessons visually. Visual reminders of secure behaviors can aid in learning retention and reduce a company's vulnerability to attack. These tools are an instrumental part of a Continuous Security Awareness and Education Program. The creation of these materials is the result of strong customer demand with the inaugural order coming from a major transportation company. 

Wombat is making these security awareness materials available to their partners, prospects, and customers. Dell SecureWorks will include these awareness materials, as well as the rest of the Wombat security education offering, as part of their Managed Security Awareness programs so that their clients have a comprehensive educational solution with constant reinforcement. 

Wombat is providing a complete offering of posters, articles, screen saver or electronic message board images that reinforce the lessons taught in their interactive training modules. The same images and icons used in Wombat's interactive training modules are used in the security awareness materials to aid in the recall of learned topics.

About Wombat's New Awareness Materials
Wombat's reasonably priced offering provides unlimited use of content for length of the license. A web-based portal allows companies to customize with their unique logo, download, print and ship to any location. It also provides customer support to make the production process easy. The design of the materials facilitates easy approval with internal communications stakeholders. Materials include:

  • Articles -13 different articles for use in internal newsletters or intranets
  • Posters - 13 different posters in two sizes (11" x 17" and 24" x 36") to reinforce lessons visually
  • Images -13 horizontal poster images (1024 x 768) for use as screen savers or on electronic message boards, etc.
  • Gifts - A selection of inexpensive gifts you can use to reward your employees

Wombat's award-winning "Security Training Platform" enables security officers to effectively and measurably train their employees about today's most pressing cyber security issues including social engineering, e-mail security, password management, social networking, smartphone/BYOD (Bring Your Own Device) vulnerabilities, phishing, and compliance topics such as personally identifiable information (PII), protected health information (PHI) and payment card information data security standard (PCI DSS).

Wombat's training methodology utilizes learning science principles and includes employee mock attacks with brief embedded training, as well as a full complement of 10-minute software training modules which can change employee behavior and significantly reduce an organization's susceptibility to cyber-attack. Reporting capabilities in the Platform provide both aggregate and individual data to guide follow-up training programs, and show improved results over time.

"We continue to add to our security education offering to meet the needs of busy security officers, from awareness through assessment, education, and even measurement of results," said Joe Ferrara, President and CEO of Wombat Security Technologies. "Our continued product enhancements are an example of Wombat's commitment to help Fortune 1000 companies effectively train their work force against the most current cyber security threats."

About Wombat Security Technologies
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS cyber security education solution includes a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions allow organizations to reduce employee susceptibility to attack, including phishing attacks, by over 80%. Wombat is helping Fortune 1000 customers in industry segments such as finance, technology, banking, higher education, retail, and consumer packaged goods to strengthen their cyber security defenses.

Image Available: http://www.marketwire.com/library/MwGo/2014/3/24/11G013672/Images/social_engineering_screensaver_image-15174406138.jpg
Image Available: http://www.marketwire.com/library/MwGo/2014/3/24/11G013672/Images/Social_engineering_poster_image-488547122233.jpg

Attachment Available: http://www.marketwire.com/library/MwGo/2014/3/24/11G013672/Wombat_Security_Awareness_Materials_Brochure-1075286084718.pdf

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficienc...