Skip to main content
All CollectionsGetting startedQuick-start
How-to guide: Implementing CybSafe
How-to guide: Implementing CybSafe

Our recommendations for implementing CybSafe and ensuring you gain value as fast as possible.

Robert Shough avatar
Written by Robert Shough
Updated over a week ago

To keep CybSafe’s implementation smooth, we recommend following the below steps.

These steps are not in a particular order, but rather a great place to find everything to be done.

Our interactive onboarding checklists can be found in our support widget by navigating to Tasks.

Within the support widget customers can also contact us, find help centre articles or utilise our onboarding checklists.

You can find our Onboarding tracker in our Awareness Toolkit.

It is a helpful plan that highlights all the tasks you may need to do to get up and running with CybSafe. πŸŽ‰
⚠️ Please note, we have two different onboarding trackers depending on which plan you have. The Instructions tab will give you the information you need to know which one to use.

Our Awareness Toolkit has loads of great resources to help you run your CybSafe onboarding and security campaign!

🎬 Implementation for GUIDE, PHISH or RESPOND packages.

Follow the below information if you have purchased GUIDE, GUIDE+, PHISH or RESPOND packages.

πŸ† Set some goals

We believe in setting yourself a goal and through hard work you will achieve it! Using CybSafe should not be any different.

Give some thought to what would mean a successful implementation, what would mean CybSafe was a success within your business?

  • Timeframes - How quickly do you want to launch and what would mean the launch was a success?

  • Define your goal! This might be launched to a certain office with 50% of users logging in and completed 3 CybSafe Goals.

  • Define your metrics to measure and what you would report internally.

πŸ“š Decide approach

It's always handy to think through what are your areas of focus with CybSafe?

  • Define your roll out, a phased approach with smaller groups, then office locations then rest of the world. Or is it a big bang?

    • You can phase your roll out in terms of users onto the platform and phase the introduction of features and content they may have available.

  • Communications is key!! This ensures your people understand the requirement, they are aware of CybSafe and who we are.
    Without communications you can erode trust in the platform. We have various templates in our Awareness Toolkit to help you .

    • Make a decision if you are using CybSafe's auto generated invitations mails or if you would prefer to send these yourself internally. We always advise to use our emails to save you the manual work.

  • Do you have a requirement for a pilot group? We always recommend a small test group to ensure your setup is correct. You will need to define the audience as well as all communications for this group. Everything you do to roll out to this pilot group will be almost identical to a full launch.

βš™οΈ General

There are some basic things you need to get right to ensure you set off on the right foot.

All of these items are listed in your General task list that you can find in our support widget under Tasks.

  1. Orientation: Run through our navigation tour which guides you through the various menus of the platform.

  2. Ensure your organisation details are accurate.

    1. Hot tip: setting your language on this menu sets the default language for any users you add to the platform moving forward.

  3. Configure the CybSafe platform with your organisations branding to make it instantly identifiable.

  4. Ensure you tweak your allowlisting settings in ALL tools that may filter incoming emails. Ensure you add our IP addresses to all rules policies and tools that may hinder email delivery.

  5. Work through our instructions on adding your people to the CybSafe platform. There are 4 possible routes to take.

    1. Add individual users manually.

    2. Add users in bulk via CSV upload.

    3. Automate provisioning with an integration to your directory.

    4. Utilise just in time provisioning once you have setup your SSO, just share your unique SSO URL.

  6. Setup Single Sign on to ensure ease of users for your people.

  7. Review your groups to supercharge your reporting and the ability to assign features to specific groups of users.

    1. Note: Your groups will be created by the mechanism you create your users.

      1. It is important to create the groups you want if done manually or via CSV.

      2. Groups can also be created via automated provisioning, so ensure your attribute mapping is spot on to meet your reporting requirements.

      3. By default SSO mapping will update user details, get in touch with us to amend this mapping or to turn of the update user details upon login feature.

πŸ”– GUIDE setup

Follow the below quick steps to get the most out of our GUIDE package

  1. Ensure you have completed all allowlisting activities.

  2. Evaluate all of our learning content to make a decision on what to assign to your people first.

  3. Ensure you annotate our content to suit your internal advise and guidance.

    1. Hot tip: You can also replace our content to make it really custom.

  4. Assign our content using our Learning Campaigns.

  5. Ensure your people are invited to the platform and remind them about outstanding modules.

  6. Review our Advice feature in line with the information you want your people to have access to.

    1. Hot tip: You can unpublish our advice to ensure your people get the help they need when they need it.

  7. Review our default assigned Goals to start tracking your peoples security behaviours.

🧐 GUIDE + setup

Follow the below quick steps to get the most out of our GUIDE+ package.

  1. Configure your culture survey settings to measure your people's attitudes and sentiment towards cyber security in your organisation.

  2. Understand what is possible with nudging your users to make better security decisions.

  3. Review our behaviour nudge and alerts template library, decide what you may want to send out.

  4. You may want to setup an integration to Slack or Teams to send nudges and alerts to your users.

    1. Nudges and alerts can be delivered via. few mechanisms; email, Teams, Slack or browser push notifications.

🐟 PHISH setup

Follow the below quick steps to get the most out of our PHISH package.

  1. Ensure you have completed all allowlisting activities.

  2. Review our phishing campaigns setup.

    1. You may want to target specific groups with different campaigns.

  3. Setup any report phishing integrations.

  4. review the CybSafe simulation template library.

  5. Create any of your own custom phishing simulation templates.

  6. Create any custom landing pages you may want to use.

    1. This is the webpage a user will land on if they click a link in a simulation email. i.e. a fake login page.

  7. Use the CybSafe default Intervention page or create your own.

    1. This is the page your people will view once they have fallen for a phishing simulation. its an opportunity to ensure your people get all the information to help them spot a dangerous email.

⚑️ RESPOND setup

Follow the below quick steps to get the most out of our RESPOND package.

  1. Understand our behaviour nudges and alerts and how they can be used.

  2. Review our behaviour nudge and alerts tempalte library, decide what you may want to send out.

  3. Nudges and alerts can be delivered via. few mechanisms.

    1. Email, Teams, Slack or browser push notifications.

  4. Setup any behaviour interventions you may want to go out to your people when the exhibit risky behaviours.

  5. Configure our 3rd party data integrations to collect objective security behaviours form other tools within your infrastructure.

  6. Configure our event based workflows

Congratulations on your successful implementation of CybSafe! πŸŽˆπŸŽ‚πŸ₯³

Did this answer your question?