Change Management 

Increased User Security Awareness

Start the Change Management initiative before the Migration is done

You've decided to add Multi-factor Authentication to your normal daily Security tools.   Make sure you are communicating with users well in advance of training sessions – and the rollout – to explain why the MFA is needed and how it protects the organization as well as their personal information. 

You’ve rolled out the the MFA but users are frustrated and upset.  Sound familiar? Our experience in over 1,700 deployments shows that if you deliver messaging to your users with the WIIFM (What’s in it for me?) spin it will greatly improve end user adoption.

Use a “What’s in it for me?”, or WIIFM approach

Which sounds better to you?

“By enforcing MFA we are protecting the Company” - OR – “ We have to use Multi-factor Authentication in certain circumstances in order to protect your personal information from being breached." 

Both statements are intended to notify the user of the new secure practice - but the “WIIFM” message is highlights a direct reason and benefit for users, which leads to more personal interest in using the new solution. All communications, collateral, and training in your Change Management approach should have a WIIFM context.

"Enabling’s change management process was invaluable to the successful Office 365 and Skype for Business deployments.  Enabling was instrumental in coordinating communications and training and leading the training classes, both online and on-site, which resulted in not only a high percentage of the staff attending the training but also the staff were completely prepared on Day 1 when we went live with both new platforms. "

Greg Alvarez, Sr Director of IT Ops  Major Sport Association

STAR - Security Training, Awareness and Reinforcement

As we know, Users are the first line of defense in protecting your organization from cyber attacks. With modern-day phishing attacks on the rise, are you confident your users are equipped to recognize and report security risks?  Don’t Become a Security Statistic!

One example to help users acclimate to new Security tools and processes is our STAR service.  STAR= Security Training, Awareness and Reinforcement.  

Data-driven results empower cybersecurity teams to take decisive action in addressing security concerns. Phishing campaigns provide a safe, zero-exposure, method for determining degrees of risk at the user level.

In this monthly, ongoing Security Awareness program you will:

Benchmark - Understand points of exposure with a targeted phishing campaign, along with an image-based online
quiz.  You will be surprised how many people click if the email is from a colleague!

Inform - Drive cybersecurity intelligence with Enabling’s STAR email campaigns and self-paced video learning.

Validate - Measure improvement through a second phishing campaign. Phishing campaigns provide a safe, zero-exposure, method for determining degrees of risk at the user-level.

Together we can design a plan to address organizational vulnerabilities. 

Enabling Technologies is doing the STAR program internally ourselves to mitigate risk and breaches.  Yes,  I was one of the people who clicked and had to go for further training! :)

Lights, Camera, Adoption Use Case

Our client was faced with the challenge of finding a resource, with the time and availability, as well as a proven track record of delivering positive user experiences and high adoption. Lackluster user engagement was not an option with the volume of change taking place. 

See how they achieved less than 10 calls to Support on the day of the cut over! 


Play'n Go gets more productive with M365 and Surfaces

International gaming company Play’n GO grew substantially over the last five years and needed a way to give all its employees a highly secure and productive workplace without investing in numerous costly onsite servers. The company deployed Microsoft 365, a comprehensive solution that includes Windows 10 Enterprise, Office 365, and Enterprise Mobility + Security. Standardizing on Microsoft Surface devices, the company has seen quick adoption of its new solution, resulting in improved productivity and communication among employees located around the world.

For the Full Case Study


5 Tips for Securing the @ Home Worker

As organizations hustle to enable employees to work from home, they'll inherently expand their attack surface. Here are five simple steps that can mitigate the risk in the months ahead.  

Microsoft leaps ahead in Security Magic Quadrants

Gartner’s Assessment When Microsoft posted their blog about leading in five of Gartner’s security Magic quadrants, it came as no surprise. The engineers at Enabling have been using these services to...

Revoke all user sessions for Azure AD and Office 365

Whether due to a phishing attack that created a compromised account, or you want to have a definitive offboarding process, everyone needs to be aware of the capabilities to immediately revoke and...


Security Awareness & Change Management assessment