Security Modules
Admins can assign training courses to staff members, monitor their progress, and ensure timely completion. Follow the steps below to add staff, assign train...
Mon, 10 Feb, 2025 at 12:16 PM
To enter the Training section, just click on the Training icon on the dashboard or on the Training tab on the side menu on the left. Notice that for u...
Tue, 12 Nov, 2024 at 3:48 PM
The Dark Web Monitor is one of the key features of Breach Defence. As its name suggests, it scans our Data Leak Database (it consists of over 16 billion sto...
Fri, 27 Nov, 2020 at 1:57 PM
To enter the Phishing section, just click on the Phishing icon on the dashboard or choose Phishing on the side menu on the left. When you clic...
Tue, 11 Feb, 2025 at 3:48 PM
The Hack Monitor is an essential feature of our Breach Defence product. It allows you to monitor your domains for potential Website Malware that your webpa...
Fri, 27 Nov, 2020 at 3:20 PM
Vulnerability Monitor plays a vital part in monitoring your assets for potential holes that hackers may exploit. This feature scans the open ports of your...
Fri, 27 Nov, 2020 at 3:34 PM
The Dynarisk product allows you to create, edit, save, and document policies for your staff and organization. To use the Policy module, follow these steps: ...
Fri, 7 Feb, 2025 at 12:51 PM
How Can I Use the Procedure Documentation? Dynarisk offers procedure documents and procedure-related drafts that can be used internally, available under th...
Fri, 7 Feb, 2025 at 1:06 PM
The Dynarisk system allows you to manage training courses for your staff. Using the Training Courses module, you can assign courses, track progress, and sen...
Mon, 10 Feb, 2025 at 12:34 PM
Dynarisk provides a comprehensive Additional Resources section that houses a variety of guidelines to support your team’s learning and development. In this ...
Mon, 10 Feb, 2025 at 9:12 AM