Training, Phishing, Dark Web, Security Policies, & an Interactive Portal – we cover it all.
Dark Web Monitoring
Continuous monitoring
Proactively monitor the dark web for compromised account data. The sooner users are notified of a breach, the sooner they can change their passwords. Users also have the ability to scan the dark web for their personal, friends, and family accounts with no limit.
AutoPhish
Unlimited campaigns
Routine simulated phishing has been proven to minimize the risk of users falling victim to a malicious phishing attempt. Routine phishing instils into users the very behaviours of IT professionals before they click on any link so that even on the most chaotic of days, they’re ready.
Continuous Education
Weekly micro-training video, quiz & monthly security newsletter
Weekly 2-minute micro-training video & short quiz combined with a monthly security newsletter keep cybersecurity short, engaging, and interactive. Emails sent to all your users means hands-off management.
Written Security Policies
Policy acknowledgment
Security policies are key to establishing expectations and explaining repercussions to protect your organization. Our document management portal contains a variety of customizable security policies from BYOD to Security Incident Response.
Interactive Leaderboard
Friendly competition
For users, an interactive leaderboard ignites friendly competition with just their screen name’s honour at stake. For managers, employee names are featured, with a report for performance evaluations, they can track just who needs more time bulking up!
Security Risk Assessment
Identify the security gaps
EVA identifies the human vulnerabilities and their related risks. Based on NIST standards, our Security Risk Assessment (SRA) assesses your administrative, physical, and technical vulnerabilities; identifies the associated risks, and provides recommendations for improvement.