Sorting
From A to Z
Deployments found: 9
Brief Summary. European telematics company, ABAX has been using CLTRe (pronounced “culture”) by KnowBe4 to establish a baseline for its security
culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement that can be easily relayed back to the
company’s Board. Business and Technical Challenges. With ABAX swiftly growing from a start-up of five people to over 400 staff after just ten y... Learn more
culture—periodically measuring employees’ cybersecurity behaviours and identifying areas for improvement that can be easily relayed back to the
company’s Board. Business and Technical Challenges. With ABAX swiftly growing from a start-up of five people to over 400 staff after just ten y... Learn more
With the goal of folding security awareness into the Alliance’s organizational culture and a high Phish-Prone Percentage, Mueller and Lukaszewski (the
Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching their security posture with a highly-trained human
firewall. Now that the Alliance has had its one-year anniversary with KnowBe4, the organization has increased the complexity of its simulated p... Learn more
Alliance’s director of IT and systems administrator and supervisor) to work training the staff and enriching their security posture with a highly-trained human
firewall. Now that the Alliance has had its one-year anniversary with KnowBe4, the organization has increased the complexity of its simulated p... Learn more
The Challenge. In the case of K-12 Education School District with operations serving 5 counties in Illinois, technology adoption is often a bit behind the curve
as compared to the public sector. While there are professional consortiums raising awareness of technology and security, unfortunately educational tech
departments are often not aggressively staffed nor have the appropriate budget and resources. Don Ringelestein, CETL, Director of Technology... Learn more
as compared to the public sector. While there are professional consortiums raising awareness of technology and security, unfortunately educational tech
departments are often not aggressively staffed nor have the appropriate budget and resources. Don Ringelestein, CETL, Director of Technology... Learn more
The Problem. We were aware of some of the cyber thefts occurring at medium-size businesses. However, the awareness of phishing and spear-phishing had
been localized to the IT Dept and our Risk Management team. On a management level we knew what could go wrong, but we did not have a company wide
awareness and we were not sure what we needed. We had basic security training in place as part of new employee onboarding and a yearly m... Learn more
been localized to the IT Dept and our Risk Management team. On a management level we knew what could go wrong, but we did not have a company wide
awareness and we were not sure what we needed. We had basic security training in place as part of new employee onboarding and a yearly m... Learn more
Business and Technical Challenges. With all growing organisations, the importance of security awareness is something that is built up over time. Arriving at
the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed that the culture of security awareness at ICBF and Sheep Ireland
was not progressing as it should. On the contrary, it was almost non-existent. “There was no security awareness within the company when I sta... Learn more
the organisation nearly five years ago, Jonathan Flack, senior systems administrator, noticed that the culture of security awareness at ICBF and Sheep Ireland
was not progressing as it should. On the contrary, it was almost non-existent. “There was no security awareness within the company when I sta... Learn more
Business and Technical Challenges. With sensitive information stored and passed through the systems at the Mayflower Theatre, getting security right is a top
priority for all; and despite having a robust and resilient infrastructure in place, Paul Thompson, IT Manager at Mayflower Theatre, knew that more needed to
be done. He said, “we wanted to train and educate users about the various aspects of cybersecurity, from how to structure passwords, to spotti... Learn more
priority for all; and despite having a robust and resilient infrastructure in place, Paul Thompson, IT Manager at Mayflower Theatre, knew that more needed to
be done. He said, “we wanted to train and educate users about the various aspects of cybersecurity, from how to structure passwords, to spotti... Learn more
Challenge. The struggle that Softcat faced in containing issue boils down to two primary factors. Firstly, until three years ago, its security awareness
programme was conducted on an ad hoc basis. Any training was typically implemented during the induction period, when new employees first joined the
business. On top of being infrequent, training would often be missed due to a lack of time or getting lost in the long to-do lists that accompany ... Learn more
programme was conducted on an ad hoc basis. Any training was typically implemented during the induction period, when new employees first joined the
business. On top of being infrequent, training would often be missed due to a lack of time or getting lost in the long to-do lists that accompany ... Learn more
Telkom South Africa (SA), a leading telecommunications service provider, invested in ongoing employee training and development to ensure cybersecurity
awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at risk of fraud, theft and infiltration, this level of
training is critical to ensure corporate compliance to privacy/data protection laws and individual security. Challenge. For Telkom, it was critical th... Learn more
awareness and compliance. In an evolving cybersecurity landscape that places employees and organisations at risk of fraud, theft and infiltration, this level of
training is critical to ensure corporate compliance to privacy/data protection laws and individual security. Challenge. For Telkom, it was critical th... Learn more
Challenge. Targeted social engineering attacks are the most fruitful for cyber criminals, which is why the frequency and sophistication of these types of
attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is very well aware of the problems that organizations can face
with social engineering attacks, which is why educating employees about the dangers is so important. Implementation. Having a security aware... Learn more
attacks are guaranteed to increase. Guido Angelo Ingenito, Group IT Manager, TXT e-solutions is very well aware of the problems that organizations can face
with social engineering attacks, which is why educating employees about the dangers is so important. Implementation. Having a security aware... Learn more
The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.