Now available in 27 languages, SecurityIQ continues to lead the security awareness training industry with its depth and breadth of training content. New content includes dozens of awareness training modules, four new language options and 10 mobile-optimized phishing simulations for employees on mobile devices.
New features include the ability to send phishing simulations from spoofed domains, and PhishNotify™ plugin support for EU-based Chrome users. Read on for complete release notes.
Four New Languages Available in SecurityIQ
Eleven core SecurityIQ awareness modules are now available in Danish, Swedish, Vietnamese and French Canadian. Translations include all text and audio to increase mastery and retention:
- Program Introduction
- Program Conclusion
- Physical Security
- Password Security
- Working Remotely
- Removable Media
- Social Engineering
- Mobile Security
- Safe Web Browsing
New Modules for Contractors, Developers & HR Professionals
We recently added dozens of awareness training modules to SecurityIQ, including role-based modules for federal contractors, developers and human resources staff.
- Federal Acquisition Regulation (FAR) Code of Conduct
- OWASP Top Ten Overview
- Privacy for Human Resources
- Personal Information Protection and Electronic Documents Act (PIPEDA)
Free Training Resources for K-12 Learners
SecurityIQ education clients now have access to unlimited FREE learner seats for K-12 students! Keep your young learners safe online with our K-12 awareness modules:
- Computer Security with Paige the Panda
- Security Awareness for Middle School
- Security Awareness for High School
Educate On-the-Go Users With Mobile-Optimized Phishing Simulations
Teach your employees how to detect phishing emails on their phones and tablets with 10 new mobile-optimized phishing templates in SecurityIQ. Each template includes real-time phishing indicators, showing learners who fail simulations exactly what they missed.
Back by Popular Demand: Spoof Domains in Your Next Simulation
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/oH8xdoB81Bk/