‘Kevin Mitnick Security Awareness Training’ from KnowBe4

KnowBe4’s Kevin Mitnick Security Awareness Training specializes in making sure that employees manage the ongoing problem of social engineering to help better protect organizations against threats like phishing and ransomware.

According to their recent Benchmarking Report, the average Phish-prone percentage (PPP) goes down significantly after 90 days of computer-based training and simulated phishing testing. In fact, the average PPP was cut in half, as it went down from 30% to 15%. And after one year of testing and simulated phishing, it drops down to just 2%. Across all industries, there’s a 92% improvement rate from baseline testing to 12 months of training and testing.

KnowBe4 has used educational technology applied science to build a comprehensive way to manage the ongoing problem of social engineering that can simulate the bad guys and provide online training interventions that can help organizations with this problem.

One example of a focus group comment: “I have a master’s degree in instructional technology and have evaluated content for a number of years. We are also in the education business. This is the best stuff I have ever seen. Very modern, great interactives, and incorporates all the science of learning.”

As the fastest-growing company within this market, their mission to train employees to make smarter security decisions within client organizations has been successful using world-class training and simulated phishing to improve their security posture and mitigate risk.

KnowBe4 has been recognized in the Gartner Magic Quadrant as a leader in the security awareness computer-based training market. KnowBe4’s Kevin Mitnick Security Awareness Training is the Winner of the Cool Tool Award for “Best Security Solution (Workforce)” as part of The EdTech Awards 2020 from EdTech Digest. KnowBe4 Founder and CEO Stu Sjouwerman is the Winner of The EdTech Leadership Award for CEO of the Year (Workforce).  

Learn more


    Leave a Comment

    %d bloggers like this: