thumbnail image
broken image
broken image
broken image
  • Home
  • News
  • AP Lens 
    • Sandbox Browser
  • AHO eLearn 
    • AHO eLearn
    • AHO video
  • Blog
  • About Us 
    • About Us
    • Career
    • Terms of Service
  • …  
    • Home
    • News
    • AP Lens 
      • Sandbox Browser
    • AHO eLearn 
      • AHO eLearn
      • AHO video
    • Blog
    • About Us 
      • About Us
      • Career
      • Terms of Service
    broken image
    broken image
    broken image
    • Home
    • News
    • AP Lens 
      • Sandbox Browser
    • AHO eLearn 
      • AHO eLearn
      • AHO video
    • Blog
    • About Us 
      • About Us
      • Career
      • Terms of Service
    • …  
      • Home
      • News
      • AP Lens 
        • Sandbox Browser
      • AHO eLearn 
        • AHO eLearn
        • AHO video
      • Blog
      • About Us 
        • About Us
        • Career
        • Terms of Service
      broken image
      • background image
      • Cybersecurity Awareness Online Training Platform

        Modernize one way training to interactive training

         

        broken image

        OGCIO standard requirements

        Our cybersecurity training courses will help fulfil the below guidelines:

        • Follow OGCIO IT Security Guideline 9 Human Resource Security guidance with AHO 
        • Follow OGCIO Practice Guide for Information Security Incident Handling 6.5 Training and Education guidance with AHO 
        broken image

        Modernize one way training to interactive training

        Digitalization and cloudification of your training materials

        • Apply interactive microlearning strategy
        • Include interactive images, videos and voiceover
        • Measure your audiences' progress by varies of quizzes
        • Support format: PPT, PDF, JPG, PNG, MP4, MOV, MP3 etc
        broken image

        Effortlessly fulfil audit requirements on training

        Reduce manual work, save time

        • Documentation of completion. Ideal for remote work
        • Simplify and ease the audit process
        • Reduce paper usage

        Contact us to have a demo

      • Support HR, IT and Compliance Managers

        ​AHO Online Learning Features

        broken image

        Support Multiple Screens 

        Responsive design supporting multiple screen size (Mobile, Tablet and PC)

        broken image

        Achieve ISO 27001 

        Detail reports on course completion and test results

        broken image

        Flexible Learning Path 

        Enforce mandatory learning tasks before taking tests

        broken image

        Upload Your Content 

        Support multiple type of contents, video, PowerPoint etc

        broken image

        Easy User Management 

        Easy to use user administrations

        broken image

        Export for Compliance 

        Reports can be exported in CSV format

      • Anti-Hack Operation

        Apply Game Design to Cybersecurity Training, an online e-learning platform that

        gives employees one more reason to learn

        Efficiency

        broken image
        Revise and memorize key points they previously learned from training videos, labs, quiz and stories

        Fun

        broken image
        Have a laugh while having cybersecurity training

        Culture

        broken image
        Build a sustainable culture in the workplace

        What can your team accomplish with AHO in 3 months?

        broken image
        Willingness to participate in cybersecurity training
         increases by 35%
        broken image
        The rate of forgetting of cybersecurity knowledge
        reduces from 78% to 34%
        broken image
        A long-lasting cybersecurity culture
        in the workplace
        broken image
        Build strong interpersonal relationships
        within your team

        Download product brochure

      • How “Anti-Hack Operation” fits into the whole training

        broken image

        They work best with each other.


        “Anti-Hack Operation” serves as a fun learning environment and a repetition tool to strengthen the most useful knowledge that trainees have learned in the previous training sections.

        To make it work at its best, we design the whole training program as a 3-phase training program.

         

        In phase 1 (The training videos),
        They first learn cybersecurity in our training videos which cover all cybersecurity topics.

         

        In phase 2 (Quizzes),
        They find out what exactly they remember and understand while they also gain rare playing cards for AHO as an incentive.

         

        In phase 3 (AHO),
        They apply all the knowledge they learned in the game. AHO also strengthens and allows players to memorize most of the details about cybersecurity awareness through repetition of the game.

         

        During the game, learners will face an attack where they will have to go back and seek answers from the training videos.

         

      • Design Principles

        We follow the best training principles and advice from psychologist, cybersecurity and corporate training experts to design the game. 

        broken image
      • Avoid boring instructions

        Boring instructions fail most of the time. As Michael Allen strongly suggested in his Guide to Learning, we should always keep e-learning interesting. Instead of forcing staff to learn cybersecurity knowledge in a spoon-feeding method, we offer a solution that can actually arouse their interest.

        Social and culture

        To ensure our cybersecurity training is not just a humdrum task or another brainless routine, we built it as a sustainable and engaging culture amongst the office.

         

         

         

        Repetition

        We all know that we remember information through repetition. Repetitions in a fun game would allow learners to memorize all the details subconsciously.

         

        Game and Gaming mechanism

        A well-designed game allows trainees to learn in a much easier way where they actually enjoy what they are doing instead of forcing them into memorizing something they find completely boring.

      • broken image
        broken image

        Get in touch with us

        Sign up for a free demo

      © 2018-2023

      Privacy Policy
      ×
      Privacy Policy
      Privacy Policy
       
      Effective on: 2020-09-02
       
      Introduction and Scope
      
      Hoplite Technology Limited ("Hoplite," "we," "us," "our") takes the protection of personal data very seriously. Hoplite Technology is the developer of Anti-Phishing Bot. This Privacy Notice (the "Notice") addresses data subjects whose personal data we may receive in our Anti-Phishing Bot software application (the "Service"). This Notice does not apply to personal data we collect by other means, such as personal data that we receive directly through Hoplite's own publicly accessible website.
       
      What Information does Hoplite Collect? 
      
      We receive and store any information you knowingly provide to us. When you create a new Hoplite or Anti-Phishing Bot account, we will solicit your consent to connect your Gmail, Google Suite, Microsoft 365 or Outlook account to your Hoplite APIs, thereby providing us with access to your email headers and meta data. We access and store a subset of data from your Gmail, Google Suite, O365 or Outlook account to provide you with our Services.
       
      Additional Limits on Use of Your Gmail, Google Suite, Microsoft 365 or Outlook User Data: Not withstanding anything else in this Privacy Policy, if you provide the add-ins access to the following types of your Gmail, Google Suite, Microsoft 365 data, the add-in's use of that data will be subject to these additional restrictions:
       
      The App will only use access to read, write, modify, or control Gmail, Google Suite, Microsoft 365 or Outlook message bodies (including attachments), metadata, headers, and settings to provide a web email client that allows users to compose, send, read, and process emails and will not transfer this Gmail, Google Suite, Microsoft 365 or Outlook data to others unless doing so is necessary to provide and improve these features, comply with applicable law, or as part of a merger, acquisition, or sale of assets.
       
      Hoplite acts as an agent, also known as a data processor, for the PII we process for our customers through the Service. This means that Hoplite’s customers determine the type of PII they provide to the Service for Hoplite to process on their behalf. Hoplite generally has no direct relationship with the individuals whose PII it receives from its customers and Hoplite’s customers are responsible for providing notice to the individuals whose PII will be collected and provided to Hoplite.
      
      Purpose of Processing PII
      We process PII submitted by our customers for the purposes of providing the Service to our customers, which typically involves our anti-phishing program.
       
      Basis of Processing
      Within the scope of this Notice, we process PII based on the documented instructions of our customers.
       
      Data Retention
      We delete the PII submitted to us by customers and business partners within 90 days of receiving a request to delete from our customers or the data subject unless applicable law requires a different retention period.
       
      Sharing PII with Third Parties
      We share PII with our corporate affiliates and our service providers, who process PII on behalf of Hoplite, and who agree to use the PII only to perform the Services for us or as required by law. Our service providers include businesses that provide:
       
      internet hosting and infrastructure services;
      office management services; cloud storage services; and customer service software.
      
      Our service providers may be located within or outside of the United States; however, we will require that those third parties maintain at least the same level of confidentiality that we maintain for such PII.
      
      Other Disclosure of PII
      We may also disclose PII: to the extent required by law or if we have a good-faith belief that such disclosure is necessary in order to comply with official investigations or legal proceedings initiated by governmental and/or law enforcement officials, or private parties, including but not limited to: in response to subpoenas, search warrants, or court orders, provided that in such instances we may not be able to ensure that such recipients of your PII will maintain the privacy or security of your PII;
      if we sell or transfer all or a portion of our company’s business interests, assets, or both, or in connection with a corporate merger, consolidation, restructuring, or other company change; or to our subsidiaries or affiliates only if necessary for business and operational purposes.
       
      We use and may transfer, sell, and share aggregated, anonymous data, which does not include any PII, about our Service for any legal business purpose, such as analyzing usage trends and seeking compatible business opportunities.
       
      Cookies
      A “cookie” is a small file stored on your device that contains information about your device. We may use cookies to provide Service functionality, authentication (session management), usage analytics (web analytics), and generally improve our websites and Services.
       
      We use session and persistent cookies. Session cookies are deleted when you close your browser. Persistent cookies may remain even after you close your browser, but always have an expiration date. Most of the cookies placed on your device through our Services are first-party cookies, since they are placed directly by us. Other parties, such as Microsoft, may also set their own (third-party) cookies through our Services. Please refer to the policies of these third parties to learn more about the way in which they collect and process information about you.
      
      Data Integrity & Security
      Hoplite has implemented and will maintain technical, administrative, and physical measures that are reasonably designed to help protect PII from unauthorized processing such as unauthorized access, disclosure, alteration, or destruction. However, no method of transmission over the Internet, or method of electronic storage, is 100% secure.
       
      Access, Review & Deletion
      If we store PII about you, you may have a right to request access to, and the opportunity to update, correct, or delete, such PII. You may also have the right to opt out of having your PII shared with third parties and to revoke your consent that you have previously provided for your PII to be shared with third parties, except as required by law. You also have the right to opt out if your PII is used for any purpose that is materially different from, but nevertheless compatible with the purpose(s) for which it was originally collected or subsequently authorized by you. Requests should be sent to the Hoplite customer who provided your PII to Hoplite, or to Hoplite directly at privacy@hoplite-tech.com. Hoplite has limited rights to access PII our customers submit to our Service. Therefore, if you contact us with such a request, please provide the name of the Hoplite customer who submitted your PII to our Service. We will forward your request to that customer and provide assistance to our customers, as needed, as they respond to your request.
       
      Inquiries or Complaints
      In compliance with the Privacy Shield Principles, Hoplite commits to resolve complaints about our collection or use of personal data. For inquiries or complaints regarding our Privacy Shield policy, you may contact us by emailing security@hoplite-tech.com. Hoplite representatives will respond within 24 days.
      
      Regulatory Oversight
      Hoplite Technology Limited is subject to the investigatory and enforcement powers of the Hong Kong SAR Law.
       
      Changes to this Notice
      If we make any material change to this Notice, we will post the revised Notice to this web page and update the "Effective" date above to reflect the date on which the new Notice became effective.
       
      Contact Us
      If you have any questions about this Notice or our processing of your PII, please write to our privacy contact at privacy@hoplite-tech.com or by postal mail at:
      Hoplite Technology Limited.
      Unit 538 , 19W , Hong Kong Science and Technology Park
      
      Please allow up to four weeks for us to reply.
        All Posts
        ×
        Cookie Use
        We use cookies to ensure a smooth browsing experience. By continuing we assume you accept the use of cookies.
        Learn More