Now available in our content library!

Why GoldPhish?

 

Human risk is difficult to quantify because you must consider every type of threat, from malicious attacks to employee negligence. However, investing in a holistic Cybersecurity program to change user behavior and limit human risk is a good start, and with Goldphish, It's Cyber Made Simple. A combination of mixed media engages users and helps keep security awareness front of mind. Interactive modules, quizzes, Infographics, posters, videos, and bite-sized courses complement any awareness training program. 

  • Location South Africa
  • Website www.goldphish.com
  • Content Focus Phishing Awareness, Security Awareness
Request a Demo

Onboarding

Providing you with pre-program communications for your organization to create buzz and drive compliance. 

User Enrollment

Easily enroll users on the training platform and assigned users will receive email invitations to begin training immediately. 

Get Results

Users get started with assigned training campaigns, and you can track and produce progress reports when and if you need them. 

Content Lineup

 

Below are training courses that can be assigned to users.

Name Description
Phishing A majority of cyber-intrusion attempts begin with phishing emails. These social engineering attacks are delivered via malicious links, file attachments, and login forms. This training module helps show the warning signs to look out for and what to do in the event of a phishing attack.
Passwords A password is your account’s first line of defence, but it is also vulnerable to cyber attacks. This training module covers topics such as: password strength and password diversity along with the best password security tools and practices for keeping users’ accounts secure.
Cyber Safety At Home Cyber criminals don’t discriminate and will often target personal devices and accounts as easy targets. This training module will teach users how to secure family devices and networks as well as keep sensitive information secure at home.
BEC BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. Users will learn how to recognise these scams and learn basic best practices to protect against them.
Social Engineering Social engineering is the use of deception to manipulate individuals into divulging information that may be used for fraudulent purposes. This module explains the dangers associated with smishing, vishing, and in-person attacks. Users will learn how to recognise and avoid social engineering techniques and keep themselves and their assets secure.

Last Updated 12/7/2021

Name Description
Cyber Threats Cyber crime is on the rise and everyone is a potential target. This module introduces users to the different types of criminals who frequent and use the Internet and explores why they, their family, or their company might be a valuable target for criminals.
Surfing The Web The Internet is a minefield of cyber threats and potential traps. This training module teaches users how to avoid many of the common pitfalls and dangers associated with web browsing. They will learn how URLs are constructed, URL warning signs, and how to identify and avoid malicious links. Users will also learn how to recognise secure encrypted websites.
Malware New types of malware are developed and deployed everyday by criminals to attack devices and end users. This module provides brief but comprehensive training about malicious software, a significant and rising threat across all markets. Users will learn how to recognise and prevent multiple types of phishing and malware-based threats, including Ransomware.
Passwords A password is your account’s first line of defence, but it is also vulnerable to cyber attacks. This training module covers topics such as: password strength and password diversity along with the best password security tools and practices for keeping users’ accounts secure.
Social Engineering Social engineering is the use of deception to manipulate individuals into divulging information that may be used for fraudulent purposes. This module explains the dangers associated with smishing, vishing, and in-person attacks. Users will learn how to recognise and avoid social engineering techniques and keep themselves and their assets secure.
Phishing A majority of cyber-intrusion attempts begin with phishing emails. These social engineering attacks are delivered via malicious links, file attachments, and login forms. This training module helps show the warning signs to look out for and what to do in the event of a phishing attack.
BEC BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. Users will learn how to recognise these scams and learn basic best practices to protect against them.
Mobile Devices Criminals often target our mobile devices as a means for penetrating our accounts and information. This training module will teach users the importance of physical and technical safeguards for their mobile devices, as well as ways to improve the security of their mobile communications and connections.
Social Media Cyber criminals use social media platforms to find their victims and the data needed to launch attacks. This training module will teach users how to protect themselves, their families, and their employers while using social networks.
Insider Threat Often an organisation’s biggest threat to their data and security is right under their nose. This interactive training module examines the potential for a company’s own employees, either intentionally or unintentionally, to inflict damage on the organisation. Users will learn how to recognise insider threats and learn basic best practices to protect against them.
Physical Security Securing the workplace and restricting physical access to devices and IT infrastructure is essential to securing data and online systems. This module will explain why physical security is important and how users can improve physical security in the workplace.
Travel Security Users often let down their guard when travelling or working remotely and convenience often trumps secure practices. This training module will teach users how to secure devices and keep sensitive information secure when out of the office and on the road.
Cyber Safety At Home Cyber criminals don’t discriminate and will often target personal devices and accounts as easy targets. This training module will teach users how to secure family devices and networks as well as keep sensitive information secure at home.
Information Protection Protecting sensitive information is fundamental to preventing reputational damage, business loss and identity theft. Users will learn how to responsibly handle and protect personal and company confidential information.
Incident Response It is inevitable that most people and organisations will form victim to some form of cyber crime, and how you immediately respond to the incident can make all the difference. This module provides basic training about responding to a cyber incident. Users will learn how to recognise signs that their system has been compromised and the immediate actions to take.

Last Updated 12/7/2021

Name Description
Executive Training This extended interactive module is designed to help company executives, senior managers and team leaders better understand information and cyber security threats to the business environment, their potential impact on company success, and key risk management strategies for reducing the risk. This module is aimed at empowering non-technical C-Level executives to make better informed decisions regarding organisational cyber risk management.

Last Updated 12/7/2021

Name Description
An Introduction to Cyber Security This short video introduces some general security concepts and to raise awareness about how to avoid online threats that might target you or our organisation. By identifying common online threats, understanding risk factors for each type of threat, and learning how to minimise the risk of an attack.
Creating Secure Passwords A password is your account’s first line of defence, but it is also vulnerable to cyber attacks. This short video covers topics such as: Password strength and password diversity along with the best password security tools and practices for keeping your account secure.
What is Phishing? A majority of cyber-intrusion attempts begin with phishing emails. These social engineering attacks are delivered via malicious links, file attachments, and login forms. This short video helps show the warning signs to look out for and what to do in the event of a phishing attack.
What is Ransomware? Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. This short video introduces ransomware, discusses how it is delivered, and explains the effect of an infection. Users are provided with best practices for minimizing the threat of ransomware.
Safely Surfing The Web The Internet is a minefield of cyber threats and potential traps. This short video teaches users how to avoid many of the common pitfalls and dangers associated with web browsing. They will learn how URLs are constructed, URL warning signs, and how to identify and avoid malicious links. Users will also learn how to recognise secure encrypted websites and other top tips to stay safe online.
What is a BEC Scam? BEC scams occur when attackers impersonate company stakeholders and trick your employees into transferring money or sharing confidential information. Users will learn how to recognise these scams and learn basic best practices to protect against them.
Mobile Device Security Criminals often target our mobile devices as a means for penetrating our accounts and information. This training module will teach users the importance of physical and technical safeguards for their mobile devices, as well as ways to improve the security of their mobile communications and connections.
Social Engineering Scams Social engineering is the use of deception to manipulate individuals into divulging information that may be used for fraudulent purposes. This video explains the dangers associated with smishing, vishing, and in-person attacks. Users will learn how to recognise and avoid common social engineering techniques and keep themselves and their assets secure.
Social Media Cyber criminals use social media platforms to find their victims and the data needed to launch attacks. This short video will teach users how to protect themselves, their families, and their employers while using social networks.
The Insider Threat Often an organisation’s biggest threat to their data and security is right under their nose. This interactive training module examines the potential for a company’s own employees, either intentionally or unintentionally, to inflict damage on the organisation. Users will learn how to recognise insider threats and learn basic best practices to protect against them.
Cyber Safety At Home Cyber criminals don’t discriminate and will often target personal devices and accounts as easy targets. This short video will teach users how to secure family devices and networks as well as keep sensitive information secure at home.

Last Updated 12/7/2021

Sample Training Pages

 

After a user clicks on a phishing campaign they will be shown a training page. Below are a few training pages using GoldPhish content.

Frequently Asked Questions

 

Yes. Some of the training options from GoldPhish are only 2-3 minutes. The average for the core, e-learning modules are 7-9 minutes.