Skip to main content

Only an engaged user can reduce cybersecurity risk.

People play a critical role in helping to reduce organizational risks associated with cyber-attacks. CIRA Cybersecurity Awareness Training gives IT professionals and security teams a cloud-based platform to train users, simulate phishing tactics, and measure the results.

Empower users to be part of the solution and not a risk to be managed.

Time Saving Automation

Assign and track training resources and phishing simulations automatically based on user needs and behaviour.

Useful Analytics

Benchmark the efficacy of security awareness training and simulation for NIST or other frameworks.

Effective Behaviour Change

Engage more users with gamification via personal and departmental risk scores.

Organizations implementing CIRA Cybersecurity Awareness Training see an average 3x reduction in users clicking on phishing emails.

  • Educate

    Pre-built courseware covering all major topics.

    Create and customize content with an easy-to-use editor or using third-party tools to author SCORM 1.2 compliant content.

    Select from a library of phishing assets, based on real-life situations, or customize for your organizational profile.

  • Automate

    Enroll users in core courses and automatically assign remedial education based on simulated or real phishing or SMS incidents.

    Avoid the “gopher effect” where employees warn each other of phishing tests by automatically sending to different users at different times.

    Allow employees to report phishing by email address or by Outlook 2013 and 2016 menu button integration.

  • Evaluate

    Individual risk scores are assigned based on training and simulation results and accessed via an individual dashboard.

    Customize department scoring to include exposure to cybercriminals based on the type of work performed.

    Measure user, department, and organizational risk against the NIST cybersecurity framework and against other organizations.

  • Administrate

    Fully integrated with Office 365, ADFS and SAML-based identity providers for group and user management.

    Role-based administration to allow departmental level administrators to access key functions.

    Whitelist security tools that detonate links or attachments to prevent false positives in the scoring.