Introduction

Onboarding guide

Welcome to the INFIMA Onboarding Guide

This comprehensive guide is designed to streamline your onboarding process with INFIMA's Security Awareness Training platform. We've created this resource to ensure a smooth and efficient setup for you and your clients.

Purpose of this Guide

The onboarding guide serves several key purposes:

  1. To provide a clear, step-by-step process for getting started with INFIMA
  2. To help you quickly set up new clients and add users to the platform
  3. To offer best practices and recommendations for maximizing the effectiveness of your security awareness program

Easy to Follow

We've structured this guide to be as user-friendly as possible:

  • Clear, concise instructions for each step of the onboarding process
  • Visual aids and screenshots where applicable
  • Tips and recommendations based on our experience and best practices

Whether you're new to INFIMA or looking to onboard additional clients, this guide will walk you through the process with ease. Let's get started!


Adding a client

  1. Select "Add New Client" from the dashboard.
  2. Enter the Company Name of the client. This name will appear on all reports and communications.

Adding Users

Overview

Adding users to the INFIMA platform is a crucial first step in implementing your Security Awareness Training program. This process ensures that all relevant employees are included in the training and phishing simulations.

Steps to Add Users

  1. Access the Dashboard: Log into your INFIMA account and navigate to the dashboard.

  2. Add New Client: If you haven't already, select "Add New Client" and enter the company name.

  3. Choose Add Users: Once the client is set up, select the "Add Users" option.

  4. Select Sync Method:

    • For Microsoft O365 or Azure AD users: Choose the Microsoft sync option.
    • For Google Workspace users: Select the Google Workspace sync option.
    • For manual addition: Use the bulk import CSV option.
  5. Complete the Sync Process: Follow the prompts to authenticate and complete the user sync.

  6. Validate Users: After syncing, review the user list to ensure all necessary employees are included.

  7. Deactivate Unnecessary Users: Remove any users who should not be part of the training program.

Important Considerations

For a more detailed guide with visual instructions, please refer to our Adding Users documentation.

Recommendations

Download a custom training policy

Download a custom training policy tailored to your organization's needs can help ensure that all users are aware of the security protocols and expectations.

Why we recommend it

  • Tailored Guidance: Provides specific guidelines that are relevant to your organization's security requirements.
  • Compliance: Helps ensure compliance with internal policies and external regulations.
  • Cyber Insurance: Demonstrates to cyber insurance providers that your organization is taking proactive steps to mitigate risks, which can potentially lower premiums and improve coverage terms.

Detailed Instructions


White label communications

Our platform allows partners to add their own branding including logo and sending email address to all client communication.

Why we recommend it

  • Brand Consistency: Ensures that all communications appear to come directly from your organization, maintaining brand consistency.
  • Client Trust: Builds trust with clients by presenting a professional and cohesive brand image.
  • User Engagement: Increases user engagement by making the training materials more relatable and recognizable.

Detailed Instructions


Set Up Monthly Reporting

Setting up monthly reporting ensures that you and your clients receive regular updates on the progress and effectiveness of the Security Awareness Training.

Why we recommend it

  • Performance Tracking: Allows you to track the performance and progress of your security awareness training over time.
  • Accountability: Keeps all stakeholders informed and accountable by providing regular updates on training metrics.
  • Data-Driven Decisions: Enables data-driven decisions by highlighting areas that need improvement or additional focus.

Detailed Instructions


Deploy Report Phishing Button

The Report Phishing button allows users to report suspicious emails directly from their inbox, enhancing your organization's ability to respond to phishing threats. The report phishing button is currently only available for Microsoft 365 clients.

Why we recommend it

  • Immediate Action: Empowers users to report suspicious emails immediately, reducing the risk of phishing attacks.
  • User Awareness: Increases user awareness and vigilance by making it easy to report potential threats.
  • Incident Response: Enhances your incident response capabilities by providing real-time data on phishing attempts.

Detailed Instructions


Provide Welcome Documentation

Providing welcome documentation helps new users get started with the Security Awareness Training platform quickly and effectively.

Why we recommend it

  • Smooth Onboarding: Ensures a smooth onboarding process by providing all necessary information and resources to new users.
  • User Confidence: Builds user confidence by clearly explaining how to use the platform and what to expect.
  • Support Readiness: Reduces the need for support by addressing common questions and issues upfront.

Detailed Instructions


Map PSA Integration

Mapping PSA integration ensures that your Professional Services Automation (PSA) system is seamlessly integrated with the Security Awareness Training platform.

Why we recommend it

  • Streamlined Operations: Streamlines operations by integrating your PSA system with the training platform.
  • Data Accuracy: Ensures accurate user counts across systems, ensuring that every user who needs training receives it.

Detailed Instructions

Previous
Getting started