No matter how advanced your security technology every organization has risk associated with its workforce. Human risk is difficult to quantify because stakeholders must consider every type of threat, malicious, negligent, and unwitting. Investing in a holistic program to educate and empower everyone who touches your network, inherently reduces the risk by increasing awareness and impacting culture. Optiv offers a comprehensive approach to cybersecurity education through both general end user awareness and role-based training. Meaningful, relevant, current training content establishes a solid foundation for your general user base and simulated phishing campaigns provide insight and create opportunities for risk mitigation.
We work with your stakeholders to identify appropriate general end user and role-based training providing meaningful business impacts and personal relevance to end users.
Create an environment of awareness outside of formalized training with reinforcement materials like newsletters, posters, digital images, and simulated phishing campaigns.
Cybersecurity education programs are more than just content – it’s a strategy. Transform your organization’s culture into one of awareness and ownership through positive behavior change.
NINJIO serves some of the largest companies in the world and have changed the behavior of hundreds of thousands of people through engaging, emotionally-driven storytelling.
NINJIO AWARE™ ANIME uses American anime cartoon characters to educate users about cybersecurity awareness. This video format uses NINJIO’s signature Hollywood-style storytelling that shapes the behavior of employees, staff, and team members to raise the security bar in the office and at home.
NINJIO AWARE™ CORPORATE uses a more conservative style of animation and character sets compared to NINJIO AWARE™ ANIME. No matter the style, each episode is derived from the same topic, script, and voice acting, with the only difference being different character styles.
|1||Drive Bye||This episode is inspired by the Jeep/Chrysler attack and teaches about USB security.|
|2||Amber Ashlynn pt1||This episode is inspired by the Ashley Madison attack and teaches about social engineering through Social Media.|
|3||Amber Ashlynn pt2||This episode is inspired by the Ashley Madison attack and teaches about MS Word document attacks.|
|4||Sunny Phishing||This episode is inspired by the Sony Pictures attack and teaches about spear phishing.|
|5||Turbine Twist||This episode is inspired by the American Super Conductor attack and teaches about password security.|
|6||Hospital Hijinks||This episode is inspired by the Hollywood Presbyterian Medical Center attack and teaches about Ransomware.|
|7||The W2 Heist||This episode is inspired by the Sprouts Farmers Market attack and teaches about W-2 scams.|
|8||Catfishing||This episode is inspired by multiple online dating sites and talks about Cat fishing scams.|
|9||The Wi-Fi Trap||This episode is inspired schemes used to subvert 2FA via SMS. This Episode teaches about 2FA security.|
|10||The Great Password Breach||This episode is inspired by the Anthem breach and teaches about telephone social engineering.|
|11||Hack the Vote||This episode is our first fictional episode and depicted a scenario where voting booths were hacked during the Presidential Election. This teaches about the "Microsoft Support Scam".|
|12||The Wahoo Waterhole||This episode is inspired by the Yahoo! Breach that occurred in September of 2016 and teaches about Watering Hole Attacks.|
Last Updated 5/4/2020
|1||Cyber Oil Warfare||This episode is inspired by the Saudi Aramco hack (the most expensive hack in cyber history) and teaches about badge surfing and a clean desk policy.|
|2||The Homeless Homebuyer||This episode is inspired by the many wire fraud incidents that happen every day. This Episode teaches about using verbal authorization on any transfer of funds.|
|3||Slippery Side Loading||This episode is inspired by the Googlian Attack and teaches about the dangers of side loading mobile apps.|
|4||IoT Gone Wild||This episode in inspired by the DYN DNS attack and teaches about changing your default username and password on IOT Devices.|
|5||The Ransomware Pyramid Scheme||This episode in inspired by the DYN DNS attack and teaches about changing your default username and password on IOT Devices.|
|6||My Password is Password||This episode is based on the McDonalds twitter hack and features bad/reused passwords and talks about passphrases and two-factor authentication.|
|7||156 Alarms||This episode is based on the Dallas Sirens and features spear phishing.|
|8||ElectroSign of Things to Come||This episode is based on the DocuSign hack and covers business email compromise.|
|9||Pension Plan Telescam||This episode is based on caller ID scams and covers telephone spoofing.|
|10||Beware of the Insider||This episode is based on the Google/Uber IP lawsuit and covers malicious insider threats.|
|11||Juice Jacking||This episode is based on the Equifax breach and covers phone charging hacks.|
|12||Mis-Delivery||This episode is based on email misdelivery and covers accidental insider threats and email misdelivery.|
Last Updated 5/4/2020
|1||Phishing the Stream||This episode is inspired by Netflix phishing emails and teaches about phishing and identity theft.|
|2||Laid Off, Paid Off||This episode is inspired by the Uber nondisclosure of a hack. This Episode teaches about securely working from home and VPN security.|
|3||Chicken or Smish||This episode is inspired by text message phishing schemes. This Episode teaches about smishing.|
|4||2 Factor Fake Out||This episode is inspired schemes used to subvert 2FA via SMS. This Episode teaches about 2FA security.|
|5||The Macro Trojan Takedown||This episode is inspired by the Boryspil Airport attack and teaches about macro malware.|
|6||Ransomware is Everywhere||This episode is inspired by the City of Atlanta attack and teaches about ransomware.|
|7||Update Double Take||This episode is inspired by the malicious ad-results and teaches about malvertising.|
|8||Cryptominer Pants on Fire||This episode is inspired by cryptomining and teaches about cryptojacking.|
|9||Strawberry X Forever||This episode is inspired by the US Navy hack and teaches about wireless security.|
|10||A Terminal Mistake||This episode is inspired by the SingHealth breach and teaches about spear phishing.|
|11||Data Loss by the Logger||This episode is inspired by the Zoho hacks and teaches about keystroke loggers.|
|12||Your Page is My Page||This episode is inspired by the Facebook breach and teaches about password security.|
Last Updated 5/4/2020
|1||You Never Call...||This episode is inspired by Cathay Pacific breach and teaches about business email compromise.|
|2||C'est La Vie, Chamonix||This episode is inspired by Marriott breach and teaches about mobile device management.|
|3||Up, Upvote, and Away||This episode is inspired by insider breaches and teaches about data classification.|
|4||It's Not What You Think...||This episode is inspired by blackmail scams and teaches about verifying Email spoofing.|
|5||Say It, Dont Spray It||This episode is inspired by the Citrix breach and teaches about password spraying.|
|6||Vacation Devastation||This episode is inspired by the Airbnb scams and teaches about social media security.|
|7||Blame Game||This episode is inspired by the Binance hack and teaches about malicious insider threats.|
|8||SMS SOS||This episode is inspired by The Community hacking ring and teaches about SIM card hijacking.|
|9||USB Nation||This episode is inspired by infrastructure breaches and teaches about USB drops.|
|10||Voicemail Fail||This episode is inspired by Capital One breach and teaches about spear phishing detection.|
|11||Disregard the Gift Card||This episode is inspired by gift card scams and teaches about gift card fraud.|
|12||Plug and Pay||This episode is inspired by the Pitney Bowes hack and teaches about Ransomware.|
Last Updated 5/4/2020
|1||Hook, Line, and Spoofer||This episode is inspired by telephone scams and teaches about identifying telephone spoofing.|
|2||Passphrase For Days||This episode is inspired by the most recent Macys breach and teaches about passphrases.|
|3||A Compromising Crash||This episode is inspired by the London Stock Exchange and teaches about business email compromise.|
|4||Lets Get Physical||This episode features famous actor and comedian, Jon Lovitz, and teaches about physical security.|
|5||Scams Gone Viral||This episode is inspired by COVID-19 related scams and teaches about email attachment threats.|
|6||Charity Case||This episode is inspired by money mule scams and teaches how to avoid charity-based scams.|
|7||House of Fraud||This episode is inspired by home title fraud scams and teaches about website spoofing.|
|8||401 Chaos||This episode is inspired by 401K scams and teaches about 401K Scams.|
|9||Death Smish||This episode is inspired by the Blueleaks hack and teaches about Smishing.|
|10||GPS Distress||This episode is inspired by chatbot hacks and teaches about Man-in-the-middle Attacks.|
|11||Homephished||This episode is inspired by the Suprema data breach and teaches about Social Media Spear Phishing.|
|12||Lock Before You Walk||This episode is inspired by corporate device hacks and teaches about Home VPN Security.|
Last Updated 5/4/2020
|1||WIRE TRIPPIN'||This episode is inspired by the "Sport Clips" security breach and teaches about how to identify Wire Fraud.|
|2||Dangerous Communiqu||This episode is inspired by Macro-based attacks.|
|3||Louie Louie||This episode is inspired by Privacy & PII.|
|4||DON'T FALL FOR IT||This episode is inspired by Web Browser Push Notifications.|
|5||THAT'S A WRAP||This episode is inspired by Social Engineering job post scams.|
Last Updated 5/4/2020
Sample Training Pages
Frequently Asked Questions
NINJIO uses animation instead of live-action content. The animation is more effective than live-action when illustrating in-content teachable moments, due to the animation's ability to be immersive when pulling out specific threats that end-users need to be made aware of. NINJIO purposely uses drama instead of comedy because getting hacked or scammed is no laughing matter. As an extreme example, you would not use comedy in active-shooter training videos as it is a very serious topic, as is cybersecurity for your organization. Also, comedy does not cross cultures. For example, what is funny in the U.S. is likely not funny in Latin America and vice-versa. The research that NINJIO has independently conducted on neuroscience has proven that microlearning through storytelling as a tool to change viewers' security awareness behaviors over time is the most effective way to create behavioral change in your organization, making your employees great cyber citizens.
Yes - all episodes are 3-to-4-minutes in length, making them microlearning compliant. The eLearning Industry reports that there are 5+ factors involved in making training content microlearning compliant, and NINJIO checks the box on all of them.
Yes. We offer all prospective clients the opportunity to test the system. Please contact us and we will gladly demo the system, answer any questions that you may have and provide you with a trial account.
Yes, PhishingBox maintains a robust information security program. Learn more about our security and compliance at our Trust Center.
The platform includes training from PhishingBox and other third-party content providers. Learn more about our security awareness training content providers here.
Security Awareness Training & Threat Prevention
Use our suite of security tools for a robust security awareness training and threat prevention program.