Home / Our Products / Prompt 2 Protect

Train and condition users to make the right security decisions at key moments

A split-second decision by an employee can have major consequences on an organisations security.

As an authorised Redflags® partner, Morgan Cyber Solutions provide the tools to educate and change cybersecurity behaviours. By deploying real time nudges in live scenarios, we divert your people away from high-risk activities and deliver measurable reductions in operational risk.

Prompt 2 Protect is all about delivering the right security training at the right moment.

Build a strong security culture to tackle both social engineering attacks and bad habit creep within your teams. In the below examples, Prompt 2 Protect steps in, providing gentle nudges to the user to guide good behaviour at critical moments:

  • If they have been asked to complete an action that involves sensitive data or money, has the source of the request been verified?
  • If they have been asked to upload data to an environment outside the organisation, have they double checked the credentials to make sure it is genuine?
  • If they have received an email from a contact asking them to click on a link or download a file, is it something they are expecting?
Red-flags-authorised-partner
Prompt 2 Protect
Uploading to the internet

Here, a user is uploading an internal document to a file sharing site. Prompt 2 Protect sends a nudge at the critical moment to confirm they trust this website

Prompt 2 Protect is the always on security ally, unobtrusively watching scenarios that could trigger potentially risky actions before engaging with users at the right moment.

Continuous training that takes place in the real world. Swap or enhance traditional point in time cybersecurity training with a modern approach rooted in behavioural science and proven to deliver measurable behaviour change.

Unrivalled training coverage. From reminding users to lock a screen when they walk away, to gently nudging them to verify that external request, or to report a suspected phishing email. Prompt 2 Protect is unique in regard to the breadth of its training.

Easy to measure effectiveness. With Prompt 2 Protect, you not only reduce bad security behaviors, you can prove effectiveness too. Use the advanced reporting tools to view engagement metrics and insights into your training to help you understand patterns and identify higher risk users.

 

 

 

Product Benefits

  • Drive lasting behavioural change - Because engagements are brief (often lasting less than a minute), highly relevant, and non-intrusive to improve habit formation and keep security front of mind, on average, 92% of staff view Prompt 2 Protect training as useful.
  • Comply with information security compliance demands - Being able to demonstrate proactive security awareness training is a key part of standards including ISO27001 and Cyber Essentials.
  • Create a positive working environment for your team - Team members can be nervous when it comes to IT and cybersecurity practices. Reinforcing your reporting processes, so a user knows what to do if they believe they have been targeted is very important. It is also important to reassure. If a team member thinks an error has been made, they need to know no blame is attached because in your organisation, it is always a positive to speak up.
  • Reduce cyber incidents and relieve the pressure on your SOC - By providing teams with the skills and confidence to spot social engineering attacks and the knowledge to stop bad habit creep, your organisation is highly likely to experience and reduction in cyber incidents, which will reduce the demands placed on your SOC and wider security teams.

How It Works

Morgan Cyber are here to support you at every step on your journey to implementing Prompt 2 Protect. We will source the licenses you require and run training sessions for your advocates to help them get the most out of the tools available in the platform. If you have any questions at any point, we are just a phone call away.

  • Stage 1 - Get your baseline - Baseline cyber behaviours, awareness, and skills across your company, without interrupting workflows, to understand what “normal” looks like.
  • Stage 2 - Start training your teams - Start to support your people with gentle nudges to guide behaviours when critical moments occur. Gain visibility of risky behaviours that are taking place: from engagement with suspected phishing emails to online safety, and data uploads.
  • Stage 3 - Change behaviours - As your teams become more adapt, maximise engagement by delivering targeted reminders only when relevant (to the risk) applications are in use.
  • Stage 4 - See the results - Use the advanced reporting tools to view engagement metrics and insights to measure and demonstrate the effectiveness of your interventions. From here you are ideally placed to and make data-driven informed decisions about your future campaigns.

Ready to start your Prompt 2 Protect training programme?

Schedule An Introduction