Skip Ribbon Commands
Skip to main content

VR Cybersecurity Training

How quickly can your employees spot potential security breaches?

​Cybersecurity is crucial for businesses to survive in a world dominated by cybercrime. In response, organizations are  adopting numerous tools to combat the attacks, but few know that up to 90% of cybersecurity breaches are caused by human errors. Therefore, an embedded culture of cybersecurity awareness among employees is the most important measure against cybersecurity threats.

NNIT Cybersecurity Training in Virtual Reality is a new way of providing awareness to employees. In the experience, you get a 360° picture of your office environment where 5 potential security breaches have been placed. The challenge for the user is then to find the breaches the fastest. Gamification has proven to be a vital element in order to increase knowledge retention and strengthen training effectiveness.

 

 

Esben Kaufmann +45 3075 1613 ESKU@nnit.comhttps://dk.linkedin.com/in/esbenkaufmannEsben Kaufmann

 

 

Are you prepared to protect your business-critical IT?https://www.nnit.com/cybersecurity/Pages/Are-you-prepared-to-protect-your-business-critical-IT-.aspxAre you prepared to protect your business-critical IT?
Are you prepared to protect your business-critical IT?https://www.nnit.com/OfferingsAndArticles/Pages/Are-you-prepared-to-protect-your-business-critical-IT-.aspxAre you prepared to protect your business-critical IT?
Protect your gold: How to avoid your data ending up in the wrong handshttps://www.nnit.com/OfferingsAndArticles/Pages/Protect-your-gold-How-to-avoid-your-data-ending-up-in-the-wrong-hands.aspxProtect your gold: How to avoid your data ending up in the wrong hands
Infosecurity 2020https://www.nnit.com/Pages/Infosecurity-2020.aspxInfosecurity 2020
How scammers attack your company using CEO fraudhttps://www.nnit.com/cybersecurity/Pages/How-scammers-attack-your-company-using-CEO-fraud.aspxHow scammers attack your company using CEO fraud
Cloud Securityhttps://www.nnit.com/cybersecurity/Pages/Cloud-Security.aspxCloud Security
Identity & Access Managementhttps://www.nnit.com/cybersecurity/Pages/iam.aspxIdentity & Access Management
Managed Securityhttps://www.nnit.com/cybersecurity/Pages/Managed-Security.aspxManaged Security
The Fine Art of Aligning Business Strategy and Information Security Strategyhttps://www.nnit.com/OfferingsAndArticles/Pages/The-Fine-Art-of-Aligning-Business-Strategy-and-Information-Security-Strategy.aspxThe Fine Art of Aligning Business Strategy and Information Security Strategy
​​​Building a sustainable defence: How to secure your operational technology (OT) environment​https://www.nnit.com/OfferingsAndArticles/Pages/BuildingSustainableDefence.aspx​​​Building a sustainable defence: How to secure your operational technology (OT) environment​