CybeReady for Payoneer
Categories
Description
Yaron Weiss, Payoneer's VP Corporate Security and Global IT Operations, has been leading the company’s security efforts since 2014. With steady increase in phishing attacks, Weiss realized the high-risk potential from Payoneers’ insider threat - its employees. Before learning about CybeReady in 2016, Payoneer used a different phishing simulation solution for its 1.200 employees for just one year. That solution required resources and training expertise that Payoneer's IT team didn't have, and despite the considerable effort that went into the program it generated a total of two email campaigns in a full year. With random training efforts and no proper training methodology driving the process, employee behavior didn't seem to change.
The Solution. When Weiss saw CybeReady's autonomous training platform product demo, he was immediately sold. “CybeReady’s solution addressed all the challenges ‘we were facing at the time.” he said, “itis fully managed and offers each employee continuous, training in their own inbox and their native language’. CybeReady utilizes a proven methodology, powered. by Machine Learning. It offers a minimum of 12 phishing simulations to each employee annually, and itis customized, localized and adaptive to each, employee’ performance. Weiss decided to switch to CybeReady within aweek. Getting started was fast and easy - CybeReady offers a cloud solution that takes three quick steps and a total of one hour to integrate:
- Export the company's address book
- Whitelist a short list of domains
- Approve 1st campaign
- Employee Resilience Score - more than tripled within the first six months and increased by over 7x over the two years of training with CybeReady.
- Serial Clicker Rate - The Employee High Risk Group has converted to high performing as the % of serial clickers out of all employees was reduced to almost -0%.
Details
Business tasks
Enhance Staff Productivity
Ensure Security and Business Continuity
Problems
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems