Manager Support
Manager Support Manager Support Adding Multiple Users Navigate to Manager Dashboard Select User Manager Click Add Multiple Users Complete the following fields: Password, Re-Enter Password, Group, First
Generating the Risk Score Card
Navigating the VENZA System™ Dashboard
Accessing The New VENZA System™
Generating the Executive Summary
Bulk-Upload Multiple New Users
Phishing Campaign False Positives
Certifying Group Training Attendees
How to Assign Courses and Learning Paths
Generate the Phishing Simulation Report
Phishing Simulations with VENZA
Course Navigation Troubleshooting
How to Run the Training Percentage Report
Set up Auto-Reports in VENZA Peak
Manager Support Manager Support Adding Multiple Users Navigate to Manager Dashboard Select User Manager Click Add Multiple Users Complete the following fields: Password, Re-Enter Password, Group, First
How to Reset your Employees’ Password We understand that forgetting passwords can happen, so we have implemented a simple solution for our employees to reset
How to Assign Courses and Learning Paths VENZA Peak If your organization is using VENZA PEAK, please reach out to your Customer Success Coach (or reach out
Training Your Employees With Venza This article will provide you with an overview of the training modules that are available. Do not hesitate to reach
How to Generate the Phishing Report This article will provide you with information on how to run and read the Phishing Report, so you can
Phishing Simulations with VENZA To train personnel to recognize and report phishing attempts, VENZA provides phishing campaigns as part of the Denali and Everest packages. These
What is the Intel Dashboard? How do I Access it? The Intel Dashboard is an overview of the elements that fabricate VENZA’s Training and Awareness
The VENZA Glossary We have prepared a handy glossary of the most common terms related to cybersecurity, phishing, privacy regulation, and social engineering. If you
Guiding Good People to do Great Things Venza’s Mission Statement VENZA is a data security company that provides educational tools and security measures to the
What is Phishing and how can VENZA help? How do cybercriminals acquire sensitive data? In a typical phishing effort, a target (or targets) are contacted