Paradigm
Privacy and Security Training That Puts People First™
Paradigm is data privacy and security training made for all of us. It’s modern, concise, and designed for better understanding and engagement.
Experience true engagement with Paradigm:
- Messaging designed to empower learners with a more conversational tone
- Language that puts people first. No more FUD, hackers in hoodies, or technical jargon
- Shorter modules that can be rolled out more frequently, to help programs evolve from annual hour-long training
- Mobile-first design, so your people can learn wherever they are
100% No FUD
Fear, Uncertainty, and Doubt (FUD) have been used historically to teach and scare learners into compliance–and it doesn’t work.

Research has shown that higher levels of fear and stress can impede humans’ ability to learn.
— “A Primer on Emotions and Learning” OECD.orgTraining with a Human Touch
Paradigm covers all the most important security and data privacy topics your organization needs to meet most common requirements, but it doesn’t stop there. Paradigm helps build a culture of security, accelerates learning, and connects with your people in an encouraging and conversational way.

Paradigm Fuels Faster Understanding
Security-Focused Modules
What your people will learn:
- The most common beliefs about security
- How security incidents impact us
- Common causes of security incidents
- How you can make security-conscious decisions
What your people will learn:
- How phishing scams work
- The risk phishing poses to our organization
- How to identify the warning signs of phishing attacks
- How to handle a phishing scam
What your people will learn:
- What you need to make a remote workspace secure
- How to work safely in public places
What your people will learn:
- Where to find sensitive information and resources in your workplace
- Good security habits to practice every day
- How to prevent unauthorized access
Test your employees’ phish-busting skills with this mini-game.
What your people will learn:
- How phone and texting scams work
- The signs of a SMS or text-based scam
- How to know when a call is a scam
- The best way to foil a phone or text scam
What your people will learn:
- Ways to be secure while selling
- Simple steps to protect sales data
- How to keep devices safe
- How to spot phishing scams targeting you
- Ways that security can be a sales asset
What your people will learn:
- Simple steps to earn employee trust and keep data secure
- How to spot phishing scams targeting HR
- Ways HR can create a more secure workplace
- Integrating security into the employee lifecycle
What your people will learn:
- How to stop leaks of financial data
- Regulations that affect financial data
- Simple steps for keeping finances secure
- How to spot phishing scams targeting finance
- The signs of financial fraud
What your people will learn:
- The risks in using electronic devices
- All about firewalls, antivirus, and software updates
- Common sense security habits to protect devices
What your people will learn:
- The value of data
- How to classify data types
- About retention requirements
- How access is granted
What your people will learn:
- How to spot phishing specifically designed to hook you
- How elaborate phishing schemes work
- The warning signs of scam business requests
- How to identify fake URLs and email addresses
What your people will learn:
- How social engineering scams work
- The damage caused by social engineering
- Ways scammers manipulate us
- How to spot the clues
- What to do when someone tries to scam you
What your people will learn:
- How thieves access or steal data from accounts
- How you can protect your accounts
- What makes a strong password
- How you can protect your passwords
What your people will learn:
- What’s a security incident or data breach
- Why it’s so important to report immediately
- How to spot situations or events that might be incidents
- What to do when you see an incident
What your people will learn:
- How ransomware works
- The warning signs of ransomware
- Ways to stop ransomware
What your people will learn:
- How business email compromise (BEC) scams work
- The warning signs of BEC
- How to handle a BEC message
- Simple ways to prevent BEC
Privacy-Focused Modules
What your people will learn:
- What you mean when we say “privacy”
- The importance of getting privacy right
- Uses and consequences of personal data
- Their privacy responsibilities
What your people will learn:
- How to be fair and transparent
- Why we limit the data we collect
- The importance of being accurate
- The importance of integrity and accountability
What your people will learn:
- What is a privacy incident or privacy breach
- Info about data breach notifications
- The importance of reporting incidents right away
- How to spot privacy incidents
What your people will learn:
- Our approach to privacy laws
- What about privacy is most regulated
- What privacy regulations matter to us
What your people will learn:
- The different types of personal data
- What counts as sensitive personal data
- Advanced ways we can keep data confidential
What your people will learn:
- How we store personal data
- How to share data securely
- When and how to destroy personal data



Human-To-Human Language
Paradigm Training is Your Training
- Flexible and ready-to-use modules
- Use the modules “as is”
- Combine modules with CourseEditor
- Cover multiple topics
- Go deeper within a specific topic