Skip to content

How?

Safeguarding the data that every company creates, collects, stores and exchanges is critical. Considering the value of information security, a software company enlisted Cognician's help to guide staff towards a more data security-focused mindset.

Cognician developed a series of 20 challenges, called the Security Maturity Quest, for the company to run over a six-week period. Each challenge was created to make users more aware of potential security risks, offer tips for online and device security and overall, create a more security-first atmosphere across the business.

 

Why Choose Cognician?

Our core capability is enabling large organizations to activate behavior change at scale. We achieve this by creating personalized, data-driven digital experiences that are grounded in action, follow-through, reflection, and social engagement. With our multi-day challenges, you can drive measurable change in 30 days or less.

How the Quest Works

This short digital coaching program contains a series of 21 action-based challenges that will activate a security mindset by exhibiting the most effective ways to keep your personal and organizational data safe from cybercriminals

action

Activity

Completions indicate that users have awareness and understanding of a topic.

177-envelope-mail-send-outline

Follow-Through

Positive activation checks show that users have followed through and taken specific actions.

reflection

Reflection

Insights demonstrate that users have reflected on their experiences in a way that reinforces the desired mindsets.

981-consultation-outline (2)

Social Engagement

'Likes' and comments tell us that a user's insights are positively impacting others in the group and are initiating social learning.

The Challenges

People remain the weakest link in the chain of security, and a cybersecurity mindset is the best defense against attack. According to research commissioned by IBM, the average cost of a data breach in 2020 was $3.86m. More than ever before, information security is an urgent necessity. Our Security Maturity Quest activates employees to eliminate or reduce security vulnerabilities.

The 21 challenges increase maturity in seven distinct areas: Cybersecurity awareness; email security; internet security; mobile security; confidence security; identity security; and physical security. Participants put security behaviors into practice immediately, thereby eliminating organizational vulnerabilities instantly.

45-clock-time-outline (1)
CHALLENGES
DESCRIPTION
1

Discover Your Security Maturity Score

Get started on your info security journey with this quiz!

2

Strengthen Your Passwords

Beef up your password security with our simple tips for creating strong passwords.

3

Secure Your Mobile

You'll be surprised at how much sensitive data is on your mobile phone. Start this challenge now to secure your phone from hackers in two simple steps.

4

Defend Your Device

Start this challenge to protect your data from being accessed on lost or stolen devices.

5

Know Your Network

We often take our privacy for granted. Find out why it's even more important when you're working outside of the office.

6

Refresh Your Passwords

Keep your passwords fresh – and hackers stumped – by setting yourself a reminder to update them regularly.

7

Block Your Browser

Review your logins and avoid using social media credentials to sign into other platforms or websites.

8

Don't Get Caught Out

We're all constantly under attack from cybercriminals and the proof is in your inbox. Familiarize yourself with the top tips for spotting phishing emails.

9

Prepare for the Worst

Know the procedure to follow in the event of a security breach and significantly reduce the exposure of sensitive data.

10

Passwords Past

It's much easier to have one password for multiple logins, but it's not so easy staying secure.

 11

Back It Up!

We carry a massive amount of important files on our devices. What's your backup plan?

12

Maintain Your Privacy

One of the biggest risks we face is exposing our PII – particularly over email.

13

Don't Be Tracked

Imagine someone knew your every move without you knowing. Well, it's a reality for most!

14

Lock Up

Sometimes, all it takes to access personal information is an unlocked device.

15

Check Your Recipient

Email address suggestions save you time and effort, right? Think again.

16

Spring Clean

It's nice to sometimes have a physical document to use, but what do you do when you no longer need it?

17

Be Proactive

We always think it will never happen to us, but how do we limit the damage if our PII is used in a harmful way?

18

Think before You Click

We can't trust everything we see. There's often a lot more to it than meets the eye.

19

Keep a Clean Desk

Your workstation is full of opportunities for hackers to gain sensitive information. Start this challenge now to clear and secure your physical space.

20

Stay Alert

Social engineers never rest, and they pounce when you least expect it!

21

Discover Your Security Maturity Score

You've come a long way! It's time to review your security maturity score.

 

 

Subscription Options

Activate a security mindset right away with our Security Maturity Quest. Start with a free trial for five users.
Then, pick a plan that fits your needs. We scale up with you.

Custom Package

Do you have more than 500 users in your organization? Book a call with us to create a custom package that works for you.

Frequently Asked Questions

  • Traditional InfoSec training can be seen as patronizing and even intolerable. In contrast, our Security Maturity Quest creates a meaningful learning experience that inspires users to take action and immediately reduce critical security vulnerabilities. Our platform simulates one-on-one coaching, which is the most successful kind of learning. Unlike its peers, our program leverages reflection, insight, and social learning: all of which have a lasting impact on your employees’ security mindset.

  • Yes. Our quests drive the adoption of new behaviors and habits, and the best way to do this is by giving people the opportunity to practice and repeat.

    We do this in the form of a 30-Day Quest. Each day, for the duration of the Quest, a participant accepts a bite-sized challenge. The challenge will introduce an offline activity to complete between online sessions. Once complete, a user will then come back and reflect on the experience of trying new behaviors. Reflecting on our experiences drives behavior change in a short time.

  • Designated administrators will have access to the “Manage” section of Cognician, which is our reporting dashboard.

    Manage gives admins a collection of helpful information about participants and their activities on the platform. For example, every time someone uses a cog (short for "coaching guide", which is what we call a learning module on Cognician), the system logs their actions so that administrators can view the learner’s journey, how many cogs have been completed, and where the team seems to be struggling.

    Admins can monitor general participant progress and export CSV documents that contain cog completion data and even the insights shared by the users.

  • Yes. We have a variety of Quests available, tailored to help you activate behavior change when it matters.

  • Yes. Cognician adheres to a data privacy model whereby privacy protections overlay most existing security protection mechanisms and the focus and investment is applied across People, Processes, and Technology.

  • Yes. Cognician is trusted by global management consultancies and their clients, based on the team’s practice of privacy and security by design. The team’s main security objective is to continually assess and improve its ability to prevent, detect and respond to cyber incidents using a threat-based risk management approach, and treating cybersecurity as part of its integrated risk management processes.
  • Yes. We provide 24hr support for users through our chat function. You can email support@cognician.com with any queries. Alternatively, when you are on the platform, click or tap on the chat icon on the bottom right page and the support team will assist you.

Want Measurable Results?
See Our Case Study

In this case study, we’ll show you how our Security Maturity Quest helped a software company increase its security maturity by 25% and make key changes that immediately reduced critical security risks.

View The Case Study

case-study-how-a-software-company-increased-employee-security-maturity-by-25-percent-mockup