logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
[et_pb_section fb_built=”1″ _builder_version=”4.16″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.16″ custom_padding=”||8px|||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font_size=”20px” text_line_height=”1.8em” global_colors_info=”{}”]

Do you remember when, once a year, you or a friend or family member would go and take a single self-defense class and be ready to face attackers in the streets? … Nope. Neither do I.

The fact is that most businesses expect end-users to face a constant barrage of phishing attacks, without any practice or guidance, most of the time. It can’t really be a surprise that the vast majority of security breaches still involve employees making incorrect defensive decisions when faced with phishing or social engineering attacks.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.16″ custom_padding=”5px||8px|||” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font_size=”20px” text_line_height=”1.8em” header_2_line_height=”1.4em” global_colors_info=”{}”]

The misplaced confidence in training courses and microlearning modules

For many years, security awareness training was delivered through traditional learning management systems (LMS), which use static content like text and videos, followed by a quiz. You may not have realized it, but are a number of trade-offs that had to be made, for practical reasons that resulted in inefficient and ineffective knowledge transfer and retention.

To start with, people are just not willing to spend much time in a training course to learn skills they feel they were not hired to perform, when their performance is not measured on it. So, while there are many types of threats people need to learn about, they really only get a high level of guidance in a fairly short period of time, during an annual or semi-annual course. This means that they aren’t very well prepared by foundational training. And because the training was not very specific, it isn’t retained very long.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”https://clickarmor.ca/wp-content/uploads/2023/12/unsplashimage-47.png” alt=”Sparring” title_text=”unsplashimage (47)” align=”center” _builder_version=”4.23.1″ _module_preset=”default” module_alignment=”center” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″][/et_pb_image][et_pb_text _builder_version=”4.23.1″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]

Photo by Thao LEE on Unsplash

[/et_pb_text][et_pb_cta title=”Join our next 5-Day Challenge to experience something completely unique” button_url=”https://clickarmor.ca/challenge-registration” button_text=”Sign Up For Free” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]

“The challenges were so quick I was able to do them in the time it took me to sip an espresso.” – IT Security Manager

[/et_pb_cta][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ custom_padding=”8px|||||” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font_size=”18px” text_line_height=”1.8em” header_2_line_height=”1.4em” global_colors_info=”{}”]

Gamified weekly phishing challenges: The efficient way to exercise phishing skills

So, if more frequent training isn’t the answer, what can we do? We need to recognize that traditional LMS, or even microlearning platforms, do not provide the ability to simulate phishing messages in an immersive or engaging way. And they certainly don’t provide the means or the psychological incentives for end-users to repeat and improve their skills.

The good news is that immersive, gamified phishing challenges are very effective and efficient at not only simulating phishing attacks, but also in engaging employees to improve. So, in between foundational phishing training (regardless of what type or how often they are delivered), weekly challenges not only allow end-users to retain knowledge of how to spot threats, but they incentivize end-users to practice and improve. This will add value to any security awareness program, regardless of how often foundational training is delivered.

Gamified foundational phishing courses and weekly challenges are the future of security awareness

Click Armor’s gamified phishing awareness course has been shown to measurably reduce the average end-user’s vulnerability by 60%, through a finely tuned combination of interactivity, feedback, practice and immersive simulations.

And now, Click Armor’s ability to provide continuous, gamified challenges through our Challenge Streams™ technology motivates end-users to practice and strengthen their skills. This combination provides a whole new level of human defenses against phishing and spear-phishing that wasn’t possible before.

[/et_pb_text][et_pb_button button_url=”https://clickarmor.ca/trial” button_text=”Book a free trial and see a 60% reduction in phishing vulnerability in 30 days” button_alignment=”center” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][/et_pb_button][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]

 

Scott Wright is CEO of Click Armor, the gamified simulation platform that helps businesses avoid breaches by engaging employees to improve their proficiency in making decisions for cyber security risk and corporate compliance. He has over 20 years of cyber security coaching experience and was creator of the Honey Stick Project for Smartphones as a demonstration in measuring human vulnerabilities.

[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”]

Photo by Patrick Amoy on Unsplash

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.16″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px” global_colors_info=”{}”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use