Frequently Asked Questions
BreachSecure CyberSecurity Training FAQs
What makes ThreatProtector’s training so different?
Why do employees even need cybersecurity training?
Cybercriminals evolve at a pace that even a very savvy IT teams cannot keep up with. Combine this with the fact that 70% of breaches happen because of an untrained employee and it makes for a recipe for disaster. Criminals don’t care about what business you are in, how many employees you have, nor what your revenues are each year. All they care about is extracting either data or money from you, it’s all business and your employees are on the front line of the fight.
What are the topics covered in your security training?
- Phishing, SpearPhishing and Whaling
- Social engineering tactics
- Malware and ransomware
- Effective password management
- Portable devices and how to protect them
- Physical access to locations
- How to utilize data destruction efficiently
- The importance of encryption
- Data breach
- Election Scams
- USB devices and how they can be compromised
Of course, this is not an exhaustive list of all topics. We currently have over 200 different topics covered with your employees.
How do you calculate the employee security score?
How often should security training be given?
What are the consequences if I don’t have or provide inadequate security awareness training?
Do you offer HIPAA training along with the cybersecurity training?
Inadequate training will also result in more data breaches in the long run. It’s inevitable. Your employees are the greatest security risk. Training is a great way to reduce that potential exposure. The sad thing is that there is no way to get the risk to zero, but because each person is a risk, you must take the time to implement a full strategy to enhance the “human firewall”
Is security awareness training required by law?
Does your platform scale up for very large organizations?
How is our data stored, and what precautions do you take to protect our data?
We use Amazon Web Services to host all servers and data on our platform. They are fully compliant and of course housed in ISO certified facilities. Please understand that there is no unauthorized external access to data and we only store the basic information needed to allow your employees to access the system. We don’t share information with any outside organizations and everything is held private at all times.
How much can I expect to pay for security training?
Endpoint Essentials FAQs
What specifically does Endpoint Essentials cover?
- Full whitelist security
- RDP Controls
- Endpoint maintenance and performance optimization
- Anti virus/malware
- Driver management
- Patch updates
- Remote device control
- Much more.
How can I tell if Endpoint Essentials is protecting me?
Endpoint Essentials uses a realtime protection component called SuperShield. When the product has been installed and is running, you will note a small green shield icon inside the system tray of your computer. Just take a look in the lower right-hand corner of your screen to ensure the icon is there and lit up green. If it is, you are protected.
Are scans automatically run on my devices?
What programs does Endpoint Essentials patch?
What does the driver management consist of?
How much can I expect to pay for Endpoint Essentials?
To get more pricing: https://threatprotector.com/endpoint-essentials-pricing/