Introduction
Onboarding guide
Welcome to the INFIMA Onboarding Guide
This comprehensive guide is designed to streamline your onboarding process with INFIMA's Security Awareness Training platform. We've created this resource to ensure a smooth and efficient setup for you and your clients.
Purpose of this Guide
The onboarding guide serves several key purposes:
- To provide a clear, step-by-step process for getting started with INFIMA
- To help you quickly set up new clients and add users to the platform
- To offer best practices and recommendations for maximizing the effectiveness of your security awareness program
Easy to Follow
We've structured this guide to be as user-friendly as possible:
- Clear, concise instructions for each step of the onboarding process
- Visual aids and screenshots where applicable
- Tips and recommendations based on our experience and best practices
Whether you're new to INFIMA or looking to onboard additional clients, this guide will walk you through the process with ease. Let's get started!
Adding a client
- Select "Add New Client" from the dashboard.
- Enter the Company Name of the client. This name will appear on all reports and communications.
Adding Users
Overview
Adding users to the INFIMA platform is a crucial first step in implementing your Security Awareness Training program. This process ensures that all relevant employees are included in the training and phishing simulations.
Steps to Add Users
Access the Dashboard: Log into your INFIMA account and navigate to the dashboard.
Add New Client: If you haven't already, select "Add New Client" and enter the company name.
Choose Add Users: Once the client is set up, select the "Add Users" option.
Select Sync Method:
- For Microsoft O365 or Azure AD users: Choose the Microsoft sync option.
- For Google Workspace users: Select the Google Workspace sync option.
- For manual addition: Use the bulk import CSV option.
Complete the Sync Process: Follow the prompts to authenticate and complete the user sync.
Validate Users: After syncing, review the user list to ensure all necessary employees are included.
Deactivate Unnecessary Users: Remove any users who should not be part of the training program.
Important Considerations
- If manually adding users, ensure you whitelist the appropriate IP Addresses.
- For Google Workspace syncs, complete the Domain Wide Delegation process for the client.
For a more detailed guide with visual instructions, please refer to our Adding Users documentation.
Recommendations
Download a custom training policy
Download a custom training policy tailored to your organization's needs can help ensure that all users are aware of the security protocols and expectations.
Why we recommend it
- Tailored Guidance: Provides specific guidelines that are relevant to your organization's security requirements.
- Compliance: Helps ensure compliance with internal policies and external regulations.
- Cyber Insurance: Demonstrates to cyber insurance providers that your organization is taking proactive steps to mitigate risks, which can potentially lower premiums and improve coverage terms.
White label communications
Our platform allows partners to add their own branding including logo and sending email address to all client communication.
Why we recommend it
- Brand Consistency: Ensures that all communications appear to come directly from your organization, maintaining brand consistency.
- Client Trust: Builds trust with clients by presenting a professional and cohesive brand image.
- User Engagement: Increases user engagement by making the training materials more relatable and recognizable.
Set Up Monthly Reporting
Setting up monthly reporting ensures that you and your clients receive regular updates on the progress and effectiveness of the Security Awareness Training.
Why we recommend it
- Performance Tracking: Allows you to track the performance and progress of your security awareness training over time.
- Accountability: Keeps all stakeholders informed and accountable by providing regular updates on training metrics.
- Data-Driven Decisions: Enables data-driven decisions by highlighting areas that need improvement or additional focus.
Deploy Report Phishing Button
The Report Phishing button allows users to report suspicious emails directly from their inbox, enhancing your organization's ability to respond to phishing threats. The report phishing button is currently only available for Microsoft 365 clients.
Why we recommend it
- Immediate Action: Empowers users to report suspicious emails immediately, reducing the risk of phishing attacks.
- User Awareness: Increases user awareness and vigilance by making it easy to report potential threats.
- Incident Response: Enhances your incident response capabilities by providing real-time data on phishing attempts.
Provide Welcome Documentation
Providing welcome documentation helps new users get started with the Security Awareness Training platform quickly and effectively.
Why we recommend it
- Smooth Onboarding: Ensures a smooth onboarding process by providing all necessary information and resources to new users.
- User Confidence: Builds user confidence by clearly explaining how to use the platform and what to expect.
- Support Readiness: Reduces the need for support by addressing common questions and issues upfront.
Map PSA Integration
Mapping PSA integration ensures that your Professional Services Automation (PSA) system is seamlessly integrated with the Security Awareness Training platform.
Why we recommend it
- Streamlined Operations: Streamlines operations by integrating your PSA system with the training platform.
- Data Accuracy: Ensures accurate user counts across systems, ensuring that every user who needs training receives it.