Change Management 

Increased User Security Awareness

Start the Change Management initiative before the Migration is done

You've decided to add Multi-factor Authentication to your normal daily Security tools.   Make sure you are communicating with users well in advance of training sessions – and the rollout – to explain why the MFA is needed and how it protects the organization as well as their personal information. 

You’ve rolled out the the MFA but users are frustrated and upset.  Sound familiar? Our experience in over 1,700 deployments shows that if you deliver messaging to your users with the WIIFM (What’s in it for me?) spin it will greatly improve end user adoption.

Use a “What’s in it for me?”, or WIIFM approach

Which sounds better to you?

“By enforcing MFA we are protecting the Company” - OR – “ We have to use Multi-factor Authentication in certain circumstances in order to protect your personal information from being breached." 

Both statements are intended to notify the user of the new secure practice - but the “WIIFM” message is highlights a direct reason and benefit for users, which leads to more personal interest in using the new solution. All communications, collateral, and training in your Change Management approach should have a WIIFM context.

"Enabling’s change management process was invaluable to the successful Office 365 and Skype for Business deployments.  Enabling was instrumental in coordinating communications and training and leading the training classes, both online and on-site, which resulted in not only a high percentage of the staff attending the training but also the staff were completely prepared on Day 1 when we went live with both new platforms. "

Greg Alvarez, Sr Director of IT Ops  Major Sport Association

STAR - Security Training, Awareness and Reinforcement

As we know, Users are the first line of defense in protecting your organization from cyber attacks. With modern-day phishing attacks on the rise, are you confident your users are equipped to recognize and report security risks?  Don’t Become a Security Statistic!

One example to help users acclimate to new Security tools and processes is our STAR service.  STAR= Security Training, Awareness and Reinforcement.  

Data-driven results empower cybersecurity teams to take decisive action in addressing security concerns. Phishing campaigns provide a safe, zero-exposure, method for determining degrees of risk at the user level.

In this monthly, ongoing Security Awareness program you will:

Benchmark - Understand points of exposure with a targeted phishing campaign, along with an image-based online
quiz.  You will be surprised how many people click if the email is from a colleague!

Inform - Drive cybersecurity intelligence with Enabling’s STAR email campaigns and self-paced video learning.

Validate - Measure improvement through a second phishing campaign. Phishing campaigns provide a safe, zero-exposure, method for determining degrees of risk at the user-level.

Together we can design a plan to address organizational vulnerabilities. 

Enabling Technologies is doing the STAR program internally ourselves to mitigate risk and breaches.  Yes,  I was one of the people who clicked and had to go for further training! :)

Lights, Camera, Adoption Use Case

Our client was faced with the challenge of finding a resource, with the time and availability, as well as a proven track record of delivering positive user experiences and high adoption. Lackluster user engagement was not an option with the volume of change taking place. 

See how they achieved less than 10 calls to Support on the day of the cut over! 


Play'n Go gets more productive with M365 and Surfaces

International gaming company Play’n GO grew substantially over the last five years and needed a way to give all its employees a highly secure and productive workplace without investing in numerous costly onsite servers. The company deployed Microsoft 365, a comprehensive solution that includes Windows 10 Enterprise, Office 365, and Enterprise Mobility + Security. Standardizing on Microsoft Surface devices, the company has seen quick adoption of its new solution, resulting in improved productivity and communication among employees located around the world.

For the Full Case Study


Azure AD Passwordless Authentication with FIDO2 Security Keys – Part 2

In the previous post, you saw how to enable a user or everyone for the use of a FIDO2 security key as an authentication method for Azure AD.  After the Azure AD administrator has configured each user...

It's Time To Ditch Passwords - Here's Why

279% increase in security incidents at enterprises 81% of hacking-related breaches that leveraged either stolen and/or leaked passwords 20% of IT departments time is spent dealing with forgotten...

Azure AD Passwordless Authentication with FIDO2 Security Keys – Part 1

Microsoft recently announced the public preview of support for Fast Identity Online (FIDO) using FIDO2 security keys.  FIDO is an open standard for password authentication and has been around for...


Security Awareness & Change Management assessment