Changelog

Changelog

Kinds Security update #5

Kinds Security update #5

June 30, 2025

🏆 Security Awareness Leaderboard

ntroducing our new Leaderboard - see how your cybersecurity awareness stacks up against your colleagues. Gamify your security training and compete with your teammates to become the top security champion.

  • See your current ranking among all learners in your organization

  • View the top performers and their scores

  • Track your position as you complete training and improve your security practices

  • Real-time updates as you and your colleagues progress

📊 Aware Score

Introducing your personalized Aware Score - a comprehensive measure of your cybersecurity readiness! This score takes into account:

  • ✅ Training episodes completed

  • 🎣 Phishing simulation reporting accuracy

  • 🔐 Multi-factor authentication (MFA) setup status

  • 📈 Additional security behaviors (more coming soon!)

Kinds Security update #4

Kinds Security update #4

June 27, 2025

🌐 Dark Web Status Monitoring

We're now monitoring the dark web to help protect your personal information! Your new Dark Web status appears in the top right of your dashboard, giving you real-time visibility into whether your data has been found in known data breaches.

How it works:

  • We continuously scan dark web sources for both your personal and work email addresses

  • Add as many email addresses as you'd like for comprehensive monitoring

  • Your status shows as "Good" when no compromised data is detected across all monitored emails

  • Get immediate alerts if any of your email addresses appear in new breaches

  • Take proactive steps to secure your accounts before criminals can exploit your data

Kinds Security update #3

Kinds Security update #3

May 26, 2025

New Help Desk Impersonation Training Module

We're excited to announce the launch of our new "Help Desk Impersonation Defense" training module, designed to help your team identify and respond to fraudulent technical support calls targeting businesses.

What's New

Interactive Voice Simulation

  • Experience a realistic simulated call with a fake "help desk technician" using advanced text-to-speech technology

  • Engage in a conversation that demonstrates social engineering techniques used by scammers

  • Learn to identify warning signs in real-time during a simulated attack scenario

Scenario Details

  • Focused on fraudulent help desk calls where attackers pose as technical support staff

  • Simulates attempts to trick employees into downloading suspicious software or providing system access

  • Demonstrates how attackers use urgency tactics and technical jargon to appear legitimate

  • Shows how scammers exploit trust in IT support processes

Educational Components

  • Pre-simulation briefing explaining training objectives and legal compliance

  • Interactive decision points throughout the conversation

  • Post-simulation analysis highlighting key warning signs and proper escalation procedures

  • Detailed breakdown of psychological manipulation tactics and defensive strategies

Why This Training Matters

Fraudulent technical support calls remain a significant threat vector:

  • Help desk impersonation attacks have increased significantly in recent years

  • These attacks often target credential theft and unauthorized system access

  • Proper recognition training significantly reduces successful attack rates

Implementation

  1. Modules are automatically assigned through the security awareness training platform

  2. Employees receive clear notification they are entering a training simulation

  3. Interactive scenarios guide learners through realistic defensive responses

  4. Performance analytics and completion tracking available in admin dashboard

Kinds Security update #2

Kinds Security update #2

May 14, 2025

Interactive Voice Simulation

Experience a realistic simulated call with "from IT Security" using advanced text-to-speech technology

  • Engage in a realistic conversation that demonstrates actual social engineering techniques used by threat actors

  • Learn to identify red flags in real-time during a simulated attack scenario

Scenario Details

  • Focused on the common "fake IT support" tactic where attackers pose as internal IT staff

  • Simulates an attempt to trick employees into installing remote access software (LogMeInRescue)

  • Demonstrates how attackers leverage known company information (names, emails, manager relationships) to build false credibility

Educational Components

  • Pre-simulation briefing explaining the training objectives

  • Interactive decision points throughout the conversation

  • Post-simulation breakdown highlighting key warning signs and proper response protocols

  • Detailed explanation of the technical and psychological tactics demonstrated

Why This Matters

Remote access scams continue to be one of the most successful attack vectors for threat actors targeting businesses. According to recent data:

  • Over 65% of successful breaches involve some form of social engineering

  • IT impersonation attacks have increased 43% in the past year

  • The average cost of a successful remote access breach exceeds $1.2M

How To Use This reel

  1. Reels are automatically assigned to learners through the security awareness training platform

  2. Employees will receive clear notification that they are entering a training simulation

  3. The interactive voice conversation will guide them through the experience

  4. Performance metrics and learning assessments will be available in your admin dashboard

Kinds Security Update #1

Kinds Security Update #1

May 10, 2025

Change log now available

  • Changelog added

  • Welcome to Kinds Security Changelog! This is where you can hear about the latest and greatest improvements.