Home / Solutions / Security Awareness
Behavior, measured monthly Training, simulated, coached, and reported — with the SOC on the other end.

Awareness that changes behavior. Not just completion rates.

Annual click-through training does not stop a phish at 4pm on a Friday. A program that trains, simulates, coaches, and measures every month does — and produces the number the auditor, the insurer, and the board all now ask for: phishing failure rate, trended over time. Because the same MSSP runs your SOC, every reported phish and every simulation click feeds the same analytics engine, and coaching happens before the behaviour sets.

Role-based content, not one-size-fits-all
Phishing sims wired to the SOC
Canadian-staffed, bilingual content
What moves

Four numbers that matter. All trending the right way.

Completion rate is a hygiene metric, not an outcome. The numbers that move behavior — and the ones insurers and auditors actually look at — are the ones a managed program reports monthly, not annually.

Phishing click rate
Monthly simulations measure actual click-through against realistic phish. Trended over time, by department, by role — the number insurers now look at.
Reported-phish rate
The flip side: users reporting real and simulated phish via a one-click button. A rising report rate is a more important leading indicator than a falling click rate.
100%
Attestation coverage
Auditable completion records, by-name, by-role, by-module. Evidence ready for SOC 2, ISO 27001, PCI-DSS, and insurer questionnaires without a week of harvesting.
1
Program, one team
Same MSSP runs the awareness program, the SOC receiving reported phish, and the IR team handling the click that got through. Coaching happens in real time, not in next year’s module.
What's included

Twelve capabilities, three mandates.

Train builds the knowledge base. Simulate measures whether it sticks. Coach & Measure closes the loop — turning each click, report, and near-miss into a learning moment the program tracks over time.

Train

Content that actually teaches

Security Awareness Training

Annual baseline plus monthly micro-modules across phishing, passwords, MFA, mobile, remote work, data handling, and physical security. Short, engaging, accessible — not a 60-minute slide deck.

Role-Based Training

Dedicated tracks for executives, finance & AP, developers, IT administrators, privileged-access users, and customer-facing staff. Different risks, different content, different depth.

Compliance-Driven Training

Curricula aligned to SOC 2, ISO 27001, PCI-DSS, HIPAA, PIPEDA, and Law 25 awareness requirements. Evidence packaged for the audit, not reconstructed the week before.

New Hire Onboarding

Day-one security onboarding integrated with HRIS: required-within-N-days tracks, manager attestation workflow, and the acceptable-use sign-off auditors look for.

Privacy & Data Handling

Role-based privacy training on PIPEDA, Law 25, PHIPA, and sector-specific rules. PIA awareness for product teams, breach-reporting protocol for everyone who touches personal data.

Simulate

Measured against real attack patterns

Phishing Simulation Program

Monthly phishing simulations keyed to current attacker TTPs: credential harvesting, malicious attachments, fake Microsoft 365 pages, vendor impersonation, invoice fraud. Segmented by role and difficulty.

Vishing & Smishing Simulation

Voice-phishing and SMS-phishing campaigns against the channels attackers increasingly use to bypass email controls: help-desk impersonation, MFA-fatigue calls, smishing to mobile.

Physical & USB-Drop Testing

Physical social-engineering drills, tailgating assessments, and USB-drop campaigns for sites where physical access is a credible attack path — defense, controlled-goods facilities, critical infrastructure.

Executive & BEC Simulation

Targeted whaling and business-email-compromise simulations against executives, finance, and HR. Wire-fraud scenarios, spoofed-CEO requests, payroll-diversion attempts — where the real-money loss happens.

Coach & Measure

Close the loop

Just-in-Time Coaching

When a user clicks — real or simulated — an immediate, contextual coaching moment appears, not a queued module for next quarter. The teachable moment is the moment, not the next training window.

Program Analytics & Reporting

Monthly program dashboard: click rate, report rate, repeat-offender tracking, department benchmarks, and a quarterly executive briefing board and insurers will recognize. All attestation-grade.

Security Champions Program

Peer-led champions in each department — recognized, equipped, and supported — to amplify the program beyond mandatory training. Culture, not just compliance.

From training to muscle memory

Click-through training builds awareness. A rehearsed program builds muscle memory.

The organizations with the best phishing numbers do not have smarter users — they have users who have seen the same patterns, simulated, every month, with immediate coaching and a report button that is wired to a SOC that acknowledges the submission. That loop is what converts awareness into reflex. Because the SOC, the IR team, the program analytics, and the content all live under one roof, every real phish reported and every simulation click feeds the same feedback loop.

  • Report button in Outlook and Teams wired directly to the SOC — users get acknowledgment, SOC triages, IR escalates if needed
  • Real-world phishing telemetry from the SOC feeds next month’s simulation templates — users see the actual attacks, not stock examples
  • When a simulation catches someone, just-in-time coaching happens in-line, within 60 seconds — not queued to next quarter
  • The same analytics dashboard reports the number to the board, to the insurer, and to the SOC 2 auditor — one source of truth
See engagement models
12/yr
Phishing simulations per user, not one annual test
60s
Time from click to coaching moment
1
Report button wired to a real SOC that acknowledges
24/7
SOC behind the report — not a mailbox
Audience tracks

One size does not fit. Four tracks do.

The CFO needs different training than the developer than the help-desk technician than the board director. Every role gets content calibrated to the attacks it actually sees and the access it actually holds.

All staff

Baseline & Monthly

Annual foundation plus monthly micro-modules and phishing simulations. The default track every employee is enrolled in on day one.

Modules 12/yr Sims 12/yr
Executives & Board

Whaling & BEC

Targeted content on business email compromise, wire fraud, deepfake-voice, and travel-risk scenarios. Shorter, sharper, higher-signal.

Modules Quarterly Sims Targeted
Finance & AP

Invoice & Payroll Fraud

BEC scenarios on invoice redirection, vendor-impersonation, payroll diversion, and urgent-CFO scams. Where dollars actually leave.

Modules Monthly Sims Monthly
Privileged & Technical

Dev, IT, & Admin

Secure coding, OWASP, supply-chain, help-desk social engineering, and MFA-fatigue scenarios. For the people whose credentials are worth the most.

Modules Quarterly Sims Targeted

The human layer wired to the rest of the program.

Awareness is more useful when the report button is connected to a SOC that triages, when the vCISO owns the program metric at the board table, when the IR team knows which user clicked what, and when the GRC program pulls completion evidence directly from the training platform. Same MSSP, same data, one continuous feedback loop.

Frameworks, standards, and references
Every program is anchored to the awareness and training clauses auditors, regulators, and insurers actually reference — so completion evidence maps directly into the certifications and questionnaires your business already reports against.
NIST NICE Framework
ISO/IEC 27001 A.6.3
SOC 2 CC2.2
PCI-DSS 4.0 §12.6
HIPAA 164.308(a)(5)
PIPEDA / Law 25
CyberSecure Canada
CAN-SPAM / CASL
Program lifecycle

From baseline to behavior change in four phases.

Every program follows the same sequence. Baseline first so the improvement is defensible; launch with real content, not placeholders; reinforce monthly; then measure against the industry and against yourself, year over year.

  • 01Weeks 1–4
    Baseline Unannounced baseline phishing simulation, maturity assessment, audience segmentation, HRIS integration, and a written program charter signed off by the exec sponsor. The starting number nobody can argue with later.
  • 02Months 1–3
    Launch Annual baseline training roll-out, manager enablement, report-button deployment in Outlook and Teams, first role-based tracks activated, and the first reported-phish tickets flowing to the SOC.
  • 03Months 3–12
    Reinforce Monthly simulations across all audiences, monthly micro-modules, just-in-time coaching, quarterly role-based deep-dives, monthly dashboard, and quarterly exec briefing. The loop running on its own cadence.
  • 04Year 2+
    Measure & Evolve Benchmark against sector peers, refresh content for emerging attack patterns, add role-based tracks as the org grows, and evolve the program from compliance floor into cultural differentiator.

Every program is run by a named program manager — not a ticket queue — with monthly reporting, quarterly exec briefings, and content adjustments that reflect the attacks your industry actually sees this month, not last year.

Standard deliverables: annual baseline report, monthly dashboard, quarterly executive briefing, annual program review, training attestation records, and audit-ready completion evidence mapped to every in-scope framework.

Content is bilingual (English and French) by default — which matters for Law 25 compliance, federal procurement, and any Canadian operation with Quebec-based staff.

Engagement models

Three shapes, same measurement discipline.

Not every organization is ready to consume a full managed program on day one. Start with what moves the needle today and expand. All three models produce audit-grade evidence; the difference is coverage, cadence, and how much of the program is run for you.

Model 2

Phishing Simulation Program

Sim-focused · monthly

Monthly phishing, vishing, and smishing simulations with just-in-time coaching and program analytics. Companion to an existing training platform or LMS — we measure, you keep the content stack.

Best for Organizations with existing training content that needs a credible, managed simulation program and an external number the insurer will accept.
Model 3

Compliance Training Bundle

Content-focused · annual cadence

Pre-built, framework-aligned training library: SOC 2, ISO 27001, PCI-DSS, HIPAA, PIPEDA, Law 25. Deployed into the LMS, delivered annually, with attestation records packaged for audit.

Best for Organizations with a primarily compliance-driven training requirement who will add simulation and coaching in a later phase.

Move the human-layer metric. Monthly, measurably.

A 30-minute scoping call with a senior program manager — not a sales rep. We’ll walk through your audience, the compliance drivers, the insurer questionnaire, and which engagement model actually fits. A fixed-price proposal follows inside a week.