What’s new

We regularly ship new features and improvements. Find out what’s new

Apr 26, 2023

April 2023 - New features

  • New employee view feature - It just became a lot easier to search for an individual user, change a name or delete a user entirely from the platform.
  • New user profile page A new user profile page that allows users to view training and assessment attendance and score. This helps to identify users' strengths and weaknesses and focus training efforts accordingly.
Mar 31, 2023

March 2023 - New features

  • Complete revamping of Active Directory integration - Integration is more accessible and easier for selecting which groups to include.
  • Better unlink behavior added to AD integration.
  • PDF as a subject for compliance added. Adds the option to add PDFs to the platform to use for example, for compliance issues. Currently only available by request.
Feb 20, 2023

February 2023 - New features

  • New content page. Ability to view all current training subjects, scenarios, and materials in all available languages. You can also find shareable and printable materials to support your security awareness programs. These include posters, stickers for social media, e-books, and white papers to help reinforce good cybersecurity habits at your workplace. 
  • Risk scenario details. A better explanation of each of our risk scenarios. Available both in the assessment wizard and our new Content section.
  • New viewer role. A user can be added that only has access to view reports and status as well as export reports.
Dec 31, 2022

December 2022 - New features

  • [BETA] Exporting Training program as SCORM file available by request
  • Three new assessment questions, one Phishing question, and two Vishing questions.
Nov 30, 2022

November 2022 - New features

  • New Demo view for admins added. Now a new admin has the ability to see a completed training and share it with coworkers
  • Open API - Added option to add/delete users from a specific user list
Sep 30, 2022

September 2022 - New features

  • Training schedule revamped. Introduces the ability to start training on a future date and change all future dates that are scheduled
  • [BETA] Exporting Assessment as SCORM/CMI5 file available by request
Aug 31, 2022

August 2022 - New features

New enhanced Assessment report

  • Detailed overview of all threat areas and key behavior
  • New easy to understand charts
  • See stats at a glance and spot Risk Insights from the overview page
    • Easier to identify the lowest-performing threat area 
    • Easier to recognize the weakest key behavior 
    • Easier see what question was the hardest 
  • Create new user lists directly from the report
  • Dive into details to create an informed cybersecurity strategy.
  • Send reminders to employees who have not completed the assessment directly from the report.
blank
blank
Jul 31, 2022

July 2022 - New features

  • The certificate is now downloadable directly. Was previously sent in email
Jun 30, 2022

June 2022 - New features

  • Created the ability to view assessments without logging in

Stay on top of cybersecurity threats

blank
The Human Element: A Crucial Aspect of Cyber Risk Assessment Services and 8 Ways to Address It

Cyber threats continue to grow in sophistication and frequency, making it crucial for businesses to take proactive measures to protect their sensitive...

blank
How Human-Centric Security Design is Transforming Traditional Cybersecurity Approaches

While technology continues to evolve at a rapid pace, one factor remains a constant in the cybersecurity landscape: the human element. According to va...

blank
The Importance of Multi Factor Authentication in Improving Business Security

As digital transformation continues to shape the business world, the need for robust cybersecurity measures has never been greater. One of the most cr...

blank
AwareGO is SOC2 compliant

AwareGO’s SOC2 Type 1 Compliance proves we have the governance, systems, and infrastructure in place to protect client information from unauthorized a...

blank
Demystifying the Myths about Cloud Security: What You Need to Know

Cloud computing has revolutionized the way businesses operate, offering them cost efficiency, scalability, and unprecedented flexibility. Yet, despite...

blank
Remote Working Cybersecurity: 9 Ways to Stay Safe Outside of the Office

Over the past few years, remote working has become a norm rather than the exception. While this flexible working style offers numerous benefits, it ha...

blank
AI Security Risks: Understanding the Hidden Dangers of Using Artificial Intelligence for Work

In today’s rapidly evolving digital landscape, artificial intelligence (AI) has emerged as a significant game-changer, affecting almost every industry...

blank
Locking the Digital Doors: Implementing Access Controls to Prevent Cybersecurity Tailgating

The digital landscape is a sprawling, interconnected network teeming with opportunities for businesses and individuals alike. However, it also present...

blank
How to Choose the Best Security Awareness Training Program for Your Team

Cybersecurity threats continue to pose a significant risk to organizations of all sizes, making security awareness training and human risk management...

blank
The Cost of Tailgating: Understanding the Financial Impact of Physical Security Breaches

Tailgating, also known as piggybacking, is a physical security breach that occurs when an unauthorized person follows an authorized individual into a...