Cyber security involves using various methods and tools to protect your computer systems, networks, and devices from cyber threats like hacking, malware, and phishing. Its goal is to prevent unauthorised access, theft, alteration, or destruction of sensitive data. In today’s digital world, safeguarding everyday devices against cyber-attacks is essential to keeping your business safe.
What is Security Awareness Training? Strengthen your human firewall and safeguard your organisation with BT Security Awareness Training.
Help defend your organisation against cyber criminals with engaging, automated training. Run realistic phishing simulations, grow your employees cyber defence skills and track effectiveness with insightful reports.
Optional levels of customisation
Tailor the learning to your organisation's needs.
Automated, realistic phishing simulations
Ready-made templates that mimic real world attacks.
Detailed reporting dashboard
Monitor your improving cyber awareness culture.
Optional levels of customisation
Tailor the learning to your organisation's needs.
Automated, realistic phishing simulations
Ready-made templates that mimic real world attacks.
Detailed reporting dashboard
Monitor your improving cyber awareness culture.
Organisation Adoption
For Security Awareness Training to be effective, all employees must be committed. Communication is critical to success. We encourage you to discuss with your employees why this training matters and how it will benefit them.
An email template is available on the platform to help you inform employees about upcoming learning modules and introduce continuous cybersecurity learning.
Getting set up
Introducing your platforms
When you log into Clouduss, you’ll see SAT as one of the services available to you.
Clouduss provides the infrastructure and interface, while SAT delivers the training content and user engagement tools.
What is Clouduss?
Clouduss is a cloud-based security platform developed by TrustLayer.
It provides a centralised environment to manage various cloud security services, including user protection, device management, and data security.
Think of Clouduss as your main dashboard or control centre for managing your organisation's cloud security tools.
What is Security Awareness Training (SAT)?
SAT is a module within the Clouduss platform.
It is designed to educate users on cybersecurity best practices and help reduce human risk through engaging training content.
This module is powered by BT in partnership with TrustLayer.
Steps you need to follow:
1. Welcome Email & Activation
You’ll receive a welcome email from TrustLayer Clouduss with an activation link.
Clicking the link takes you to your Clouduss environment and starts an introductory video.
2. Introductory Video
The video gives an overview of the Clouduss dashboard and explains where to find your SAT licenses.
It also highlights other admin features available in the dashboard.
3. Accessing SAT
After the video, click Next to see your SAT license information.
Click on the character icon to access the BT User Adoption Hub, which provides tips and resources for using SAT effectively.
4. Navigating the Dashboard
Once you close the video, you’ll see the Admin view of your Clouduss dashboard.
Here, you can:
View your SAT licenses
See billing information
Access the BT App Marketplace
Launch the SAT platform by clicking the green icon
Getting set up
Here are the key things to check off to ensure that you have the platform correctly set up for your employees to begin learning and protecting your organisation against cyber threats:
1. The platform is accessible on multiple devices, but initial setup is best done on a desktop or laptop.
4. Personalised and Bespoke learning journey only: Personalise your learning journey by adding your organisation’s logo and branded colours.
5. Create a learning journey with 12 courses and 12 phishing simulations per year from the available library, selecting a start date.
6. Communicate with employees using the provided email template about the monthly training modules.
Navigating the platform
When you log in you will be presented with the home page similar to below:
Use the navigation tab on the left side of the screen. Key tabs include:
Your Courses
View and manage your outstanding and completed courses, these are shown on the homepage, and as a tab at the top to toggle between both
News feed
This page shows the latest news related to IT security from various trusted partners.
Users
This page provides all user management functionality including user permissions, manual user addition and deletion, automated user synchronisation and user auditing, this section has four areas of: : ‘User management’, ‘User sync’, ‘Additional data’ and ‘Logs’.
Settings
Configure and manage your account.
Accessibility
In the top right corner on the webpage is the option to switch the UI from light to dark mode.
Journey Builder
Create, view, and edit learning journeys
On Demand
Allows courses and simulations to be sent out to users immediately or scheduled alongside the planned learning journey
Content Packs
Allows the creation of content packs (a set of courses) which can be sent out to users.
Reports
Access dashboard and reports on user engagement
Feedback
Send suggestions to improve the platform
Help
You’ll be able to raise an incident with our service desk and navigate to BT Business Apps
Device Accessibility
If you’re working on a small screen, the left-hand menu will be collapsed by default. To expand or collapse the menu, click on the chevrons next to the logo in the top left corner.
Utilising the platform
To get your organisation started with Security Awareness Training, we will focus on two core functionalities:
Setting Up Users: This involves creating and managing user accounts to ensure everyone in your organisation is included in the training program.
Simulation and Course Sending: This includes scheduling and sending out training simulations and courses to users, helping them stay informed and prepared.
These functionalities are essential to effectively launch and maintain your security awareness initiatives.
User Management
User Tab Overview
On your navigation menu on the 3rd tab it displays ‘users’
Access the ‘Users’ tab to:
Manage user accounts and permissions.
Synchronise user data with Microsoft or Google.
Manage additional user information.
View user activity logs.
Admins can enable/disable accounts and delete users directly from the user table for efficient management.
Display functionality and filtering
To update the attributes displayed for users:
Click the ‘Select Columns’ Icon: This will open a list of available attributes.
Show or Hide Attributes: Choose which attributes to display or hide in the user table.
Additionally, you can filter users based on specific attributes:
Apply Filters: Use the filtering options to narrow down the user list based on criteria such as user group, department, or other attributes.
Refine Results: Adjust filters to view only the users that meet your selected criteria.
Managing users
Admins can perform several actions directly within the user table without opening each user's details:
Enable/Disable User Accounts:
Click the ‘Enabled’ or ‘Disabled’ icon next to the user to toggle their account status.
Delete Users:
Select one or more users and click the ‘Delete’ button to remove them.
These options streamline user management, making it quick and efficient.
User Sync
Once connected and operating normally, the ‘User Sync’ tab will display a screen similar to the one shown below. Here, the admin can:
View Sync Configuration: See details of how the sync is set up.
Check Connected Groups: Identify which groups are connected.
User Sync with Microsoft or Google
Once connected to Google or Microsoft and operating normally, the User Sync tab will display a screen similar to the one shown below. Here, the admin can:
View Sync Configuration: See details of how the sync is set up.
Check Connected Groups: Identify which groups are connected.
Further User Management
By clicking the ‘View’ button, a user detail window will appear where the admin can manage individual user settings and attributes. This window is divided into four sections: User Settings, User Details, Active Journey, and Journey History.
User Settings
Enabled/Disabled: Toggle user access on or off.
Tenancy Admin: Elevate a user to admin status, automatically granting them reporting and on-demand access.
Reporting Level: Provide access to reporting functionality, either for the entire tenancy or restricted to a specific department or location. Useful for managers needing to view team statistics without full admin access.
On-Demand Level: Grant access to on-demand functionality, either for the entire tenancy or restricted to a specific department or location. Allows managers to control courses and simulations sent to their teams without full admin access.
Delete User: Remove the user from the platform.
Sending Simulations and Courses
Sending Simulations and Courses
To access Simulations and courses, as an administrator you select the ‘On Demand’ option in the left-hand below.
Schedule Tab
The Schedule tab allows you to create simulation sends by clicking the Simulation button, and course sends by clicking the Course button, using a simple step-by-step wizard described in the following sections.
It also displays upcoming sends in an easy-to-read table, with the option to cancel them if needed.
Simulation set up
After clicking the ‘Simulation’ button, as an administrator you are taken to a simple four step wizard to create a scheduled send as shown below.
Simulations:
Create scheduled sends using a simple four-step wizard.
Choose from three types of phishing simulations:
Single Stage: The user clicks on a link and is redirected to a landing page, indicating that this was not a real phishing attack.
Two Stage: The user clicks on a link and is redirected to enter their details into a fake domain. After entering their details, they are taken to a landing page, indicating that this was not a real phishing attack.
404: Similar to the single stage simulation, but instead of a landing page, the user is taken to a blank page displaying "404 – Block Page." This is useful if you prefer not to reveal that these emails are simulations.
Personalised or Bespoke learning journeys can create custom simulations.
Note: The availability of simulations in your library depends on the learning journey you choose.
Sending a simulation
Audience
After selecting the simulations and clicking the ‘Confirm Selection’ button, the admin can choose the recipients for the send. Recipients can be:
All Users: Send to everyone in the organization.
Explicitly Chosen Users: Select specific individuals.
User Attributes: Target based on attributes such as user group or department.
This flexibility ensures that the right users receive the appropriate simulations, enhancing the effectiveness of your security awareness training.
Schedule your simulation
In this step, you can select when to send your simulations, with three flexible options available:
Send Immediately: Dispatch the simulations right away.
Schedule for a Future Date: Choose a specific date and time to send the simulations.
Randomised Batches: Distribute the simulations randomly in batches within a defined date range. If the send period spans more than one week, you have the option to pause sends over weekends.
This flexibility enables you to tailor the timing to suit your organisation’s needs and maximise user engagement.
Note: Within the ‘Simulation’ tab, users on a Personalised or Bespoke learning journey have the option to create their own simulations.