Security Awareness Training

Admin guides

Admin guides

woman on laptop
What is Cyber Security? 

Cyber security involves using various methods and tools to protect your computer systems, networks, and devices from cyber threats like hacking, malware, and phishing. Its goal is to prevent unauthorised access, theft, alteration, or destruction of sensitive data. In today’s digital world, safeguarding everyday devices against cyber-attacks is essential to keeping your business safe.

What is Security Awareness Training?
Strengthen your human firewall and safeguard your organisation with BT Security Awareness Training. Help defend your organisation against cyber criminals with engaging, automated training. Run realistic phishing simulations, grow your employees cyber defence skills and track effectiveness with insightful reports.

Optional levels of customisation
Tailor the learning to your organisation's needs.
Automated, realistic phishing simulations
Ready-made templates that mimic real world attacks.
Detailed reporting dashboard
Monitor your improving cyber awareness culture.
Optional levels of customisation
Tailor the learning to your organisation's needs.
Automated, realistic phishing simulations
Ready-made templates that mimic real world attacks.
Detailed reporting dashboard
Monitor your improving cyber awareness culture.

Organisation Adoption

For Security Awareness Training to be effective, all employees must be committed. Communication is critical to success. We encourage you to discuss with your employees why this training matters and how it will benefit them.

An email template is available on the platform to help you inform employees about upcoming learning modules and introduce continuous cybersecurity learning.

 

 

Getting set up

When you log into Clouduss, you’ll see SAT as one of the services available to you.

 

Clouduss provides the infrastructure and interface, while SAT delivers the training content and user engagement tools.

 

What is Clouduss?

  • Clouduss is a cloud-based security platform developed by TrustLayer.
  • It provides a centralised environment to manage various cloud security services, including user protection, device management, and data security.
  • Think of Clouduss as your main dashboard or control centre for managing your organisation's cloud security tools.

 

What is Security Awareness Training (SAT)?

  • SAT is a module within the Clouduss platform.
  • It is designed to educate users on cybersecurity best practices and help reduce human risk through engaging training content.
  • This module is powered by BT in partnership with TrustLayer.

 

Steps you need to follow:

 

1. Welcome Email & Activation

  • You’ll receive a welcome email from TrustLayer Clouduss with an activation link.
  • Clicking the link takes you to your Clouduss environment and starts an introductory video.

 

2. Introductory Video

  • The video gives an overview of the Clouduss dashboard and explains where to find your SAT licenses.
  • It also highlights other admin features available in the dashboard.

 

3. Accessing SAT

  • After the video, click Next to see your SAT license information.
  • Click on the character icon to access the BT User Adoption Hub, which provides tips and resources for using SAT effectively.

 

4. Navigating the Dashboard

  • Once you close the video, you’ll see the Admin view of your Clouduss dashboard.
  • Here, you can:
    • View your SAT licenses
    • See billing information
    • Access the BT App Marketplace 
    • Launch the SAT platform by clicking the green icon

Here are the key things to check off to ensure that you have the platform correctly set up for your employees to begin learning and protecting your organisation against cyber threats:

 

1.     The platform is accessible on multiple devices, but initial setup is best done on a desktop or laptop.

2.     Access the platform via the noreply@clouduss.com email

3.     Add users either by bulk upload or manually.

4.     Personalised and Bespoke learning journey only: Personalise your learning journey by adding your organisation’s logo and branded colours.

5.     Create a learning journey with 12 courses and 12 phishing simulations per year from the available library, selecting a start date.

6.     Communicate with employees using the provided email template about the monthly training modules.

When you log in you will be presented with the home page similar to below:

 

service handbook screenshot

Use the navigation tab on the left side of the screen. Key tabs include: 

Your Courses View and manage your outstanding and completed courses, these are shown on the homepage, and as a tab at the top to toggle between both
News feed This page shows the latest news related to IT security from various trusted partners. 
Users This page provides all user management functionality including user permissions, manual user addition and deletion, automated user synchronisation and user auditing, this section has four areas of:  : ‘User management’, ‘User sync’, ‘Additional data’ and ‘Logs’.
Settings Configure and manage your account.
Accessibility In the top right corner on the webpage is the option to switch the UI from light to dark mode.
Journey Builder Create, view, and edit learning journeys
On Demand Allows courses and simulations to be sent out to users immediately or scheduled alongside the planned learning journey 
Content Packs Allows the creation of content packs (a set of courses) which can be sent out to users.
Reports Access dashboard and reports on user engagement
Feedback Send suggestions to improve the platform
Help You’ll be able to raise an incident with our service desk and navigate to BT Business Apps 
Device Accessibility If you’re working on a small screen, the left-hand menu will be collapsed by default. To expand or collapse the menu, click on the chevrons next to the logo in the top left corner.

 

To get your organisation started with Security Awareness Training, we will focus on two core functionalities:

 

Setting Up Users: This involves creating and managing user accounts to ensure everyone in your organisation is included in the training program.

 

Simulation and Course Sending: This includes scheduling and sending out training simulations and courses to users, helping them stay informed and prepared.

 

These functionalities are essential to effectively launch and maintain your security awareness initiatives.

User Management

service handbook screenshot

On your navigation menu on the 3rd tab it displays ‘users’
 

  • Access the ‘Users’ tab to:
  • Manage user accounts and permissions.
  • Synchronise user data with Microsoft or Google.
  • Manage additional user information.
  • View user activity logs.


Admins can enable/disable accounts and delete users directly from the user table for efficient management.

service handbook screenshot

 

To update the attributes displayed for users:

  1. Click the ‘Select Columns’ Icon: This will open a list of available attributes.
  2. Show or Hide Attributes: Choose which attributes to display or hide in the user table.

service handbook screenshot

Additionally, you can filter users based on specific attributes:

  1. Apply Filters: Use the filtering options to narrow down the user list based on criteria such as user group, department, or other attributes.
  2. Refine Results: Adjust filters to view only the users that meet your selected criteria.

Admins can perform several actions directly within the user table without opening each user's details:

service handbook screenshot

 

Enable/Disable User Accounts:

  • Click the ‘Enabled’ or ‘Disabled’ icon next to the user to toggle their account status.

 

Delete Users:

  •   Select one or more users and click the ‘Delete’ button to remove them.

These options streamline user management, making it quick and efficient.

 

User Sync

Once connected and operating normally, the ‘User Sync’ tab will display a screen similar to the one shown below. Here, the admin can:

  1. View Sync Configuration: See details of how the sync is set up.
  2. Check Connected Groups: Identify which groups are connected.

service handbook screenshot

Once connected to Google or Microsoft and operating normally, the User Sync tab will display a screen similar to the one shown below. Here, the admin can:
 

  • View Sync Configuration: See details of how the sync is set up.
  • Check Connected Groups: Identify which groups are connected.

By clicking the ‘View’ button, a user detail window will appear where the admin can manage individual user settings and attributes. This window is divided into four sections: User Settings, User Details, Active Journey, and Journey History.
 

User Settings
 

  • Enabled/Disabled: Toggle user access on or off.
  • Tenancy Admin: Elevate a user to admin status, automatically granting them reporting and on-demand access.
  • Reporting Level: Provide access to reporting functionality, either for the entire tenancy or restricted to a specific department or location. Useful for managers needing to view team statistics without full admin access.
  • On-Demand Level: Grant access to on-demand functionality, either for the entire tenancy or restricted to a specific department or location. Allows managers to control courses and simulations sent to their teams without full admin access.
  • Delete User: Remove the user from the platform.
Sending Simulations and Courses

To access Simulations and courses, as an administrator you select the ‘On Demand’ option in the left-hand below.

 

service handbook screenshot

service handbook screenshot

The Schedule tab allows you to create simulation sends by clicking the Simulation button, and course sends by clicking the Course button, using a simple step-by-step wizard described in the following sections.

 

 It also displays upcoming sends in an easy-to-read table, with the option to cancel them if needed.

After clicking the ‘Simulation’ button, as an administrator you are  taken to a simple four step wizard to create a scheduled send as shown below.

 

service handbook screenshot

Simulations:
 

  • Create scheduled sends using a simple four-step wizard.

  • Choose from three types of phishing simulations:

Single Stage: The user clicks on a link and is redirected to a landing page, indicating that this was not a real phishing attack.

Two Stage: The user clicks on a link and is redirected to enter their details into a fake domain. After entering their details, they are taken to a landing page, indicating that this was not a real phishing attack.

404: Similar to the single stage simulation, but instead of a landing page, the user is taken to a blank page displaying "404 – Block Page." This is useful if you prefer not to reveal that these emails are simulations.
 

  • Personalised or Bespoke learning journeys can create custom simulations.
     

Note: The availability of simulations in your library depends on the learning journey you choose.

service handbook screenshot

After selecting the simulations and clicking the ‘Confirm Selection’ button, the admin can choose the recipients for the send. Recipients can be:
 

  • All Users: Send to everyone in the organization.
  • Explicitly Chosen Users: Select specific individuals.
  • User Attributes: Target based on attributes such as user group or department.
     

This flexibility ensures that the right users receive the appropriate simulations, enhancing the effectiveness of your security awareness training.

service handbook screenshot

In this step, you can select when to send your simulations, with three flexible options available:

 

  1. Send Immediately: Dispatch the simulations right away.
  2. Schedule for a Future Date: Choose a specific date and time to send the simulations.
  3. Randomised Batches: Distribute the simulations randomly in batches within a defined date range. If the send period spans more than one week, you have the option to pause sends over weekends.

 

This flexibility enables you to tailor the timing to suit your organisation’s needs and maximise user engagement.

 

Note: Within the ‘Simulation’ tab, users on a Personalised or Bespoke learning journey have the option to create their own simulations. 

service handbook screenshot

Follow these steps to quickly set up and schedule a course send:

 

1.     Click the ‘Course’ Button

This will launch a simple four-step journey builder designed to guide you through creating a scheduled course send, as shown in the image above. Follow the prompts on-screen, and refer to this guide for additional support if needed.

 

2.     Select Courses

From the course library, choose one or more courses to include in your schedule. The available courses will depend on the learning journey assigned to your organisation.

 

3.     Review Course Details

A table will display detailed information about each course, including an option to Preview the course content before making your selection.

 

4.     Complete the Journey Builder

Continue through the remaining steps in the journey builder to finalise your course selection and schedule.

 

5.     Confirm Course Selection

After choosing your courses, click the Confirm Selection button to proceed.

 

6.     Choose Recipients

Select who will receive the courses:

All Users: Send to everyone in your organisation.

Specific Individuals: Select particular users.

User Attributes: Target recipients based on criteria such as department, role, or user group.

 

7.     Select Timing Options

Choose when to send the courses:

Send Immediately: Dispatch the courses right away.

Schedule for a Future Date: Set a specific date and time for sending.

Spread in Batches: Distribute the sends over a range of dates. If the schedule spans more than one week, you can pause sends over weekends as needed.

These options provide flexibility to ensure your courses are delivered at the most convenient times for your organisation.

 

8.     Course Schedule Completion

The final step presents a clear summary of all your selections and settings. Review this summary carefully to ensure everything is correct before finalizing the send.