Logo
24 7 Cyber Security Training Support Through a WhatsApp Concierge
SecurePath Cyber Training Logo

24 7 Cyber Security Training Support Through a WhatsApp Concierge

SecurePath Cyber Training

A cyber security training provider used Voxd on WhatsApp to support learners anytime, improve course impact and reduce tutor overload.

Learner asks why they can’t reuse one password everywhere; bot explains risks, offers practical tips, and shares password manager assets.

WhatsApp
14:14
Battery
Battery
Battery
Logo
SecurePath Cyber Training
Business Organisation

Hi—quick question from the SecurePath Cyber Training session. I don’t get why I can’t just use my normal password for everything. It’s strong and I can remember it. Isn’t that the whole point?

14:10

Totally fair question—and it’s one of the biggest real-world risks.

Even if your “normal password” is strong, the problem is password reuse. If any site/app you use gets breached and that password leaks, attackers try the same email+password on your work accounts and other services (called credential stuffing). So one breach can become many.

Think of it like: a strong key is still a problem if it opens every door you have.

Can I ask: are you reusing it across personal accounts only, or also anything work-related (email, VPN, HR portals)?

14:10

Honestly… personal stuff and a couple work systems too. But changing loads of passwords is impossible. I’ll forget them.

14:11

You’re not alone—remembering many unique passwords isn’t realistic. That’s why best practice is:

  1. One strong master password you memorise
  2. A password manager that creates/stores unique passwords for every site

Then you only remember one password, but you still get unique logins everywhere. If one site leaks, attackers can’t use that password anywhere else.

Quick safe starting point for you today:

  • Change your work email password first (most important)
  • Turn on MFA where available
  • Move reused accounts into a password manager

Want recommendations for a manager, or does your organisation provide one?

14:11

I don’t think we have one. Any recommendations? Also what makes a good “master password”?

14:12

Yep. Look for a reputable password manager with:

  • End-to-end encryption (zero-knowledge)
  • MFA support
  • Password generator + breach alerts
  • Sync across phone/laptop

Common options people use: 1Password, Bitwarden, Dashlane (pick one and stick with it).

Master password: use a long passphrase you can remember, e.g. 4–6 random words + a twist. Long beats complex.

If helpful, SecurePath Cyber Training has a short explainer + setup guide:

Do you mainly log in on phone, laptop, or both?

14:13

Both. If I use a password manager and it gets hacked, aren’t I losing everything at once?

14:14

Great concern—and it’s the right thing to challenge.

A good password manager is designed so the provider can’t read your vault. Your data is encrypted on your device, and only your master password (and ideally MFA) can unlock it. So even if the company had a breach, attackers typically can’t “just open” everyone’s vault.

Compare risks:

  • Reuse: one random website breach can expose your work logins immediately
  • Password manager: concentrates risk, but with strong encryption + MFA it’s usually far safer in practice

Key habits:

  • Use a unique long master passphrase
  • Enable MFA on the manager
  • Keep devices updated

If you tell me which manager you’re leaning toward, I can share the safest setup steps.

14:14
Scroll down to see the rest of the conversation
Sticker

Learner reports a suspicious software-update pop-up; SecurePath Cyber Training chatbot guides verification steps and safe escalation per policy.

WhatsApp
10:16
Battery
Battery
Battery
Logo
SecurePath Cyber Training
Business Organisation

Hi—quick question. I just got a pop-up on my work laptop saying I need to “Update Security Software Now” with a big button. It looks urgent. Should I click it?

10:12

Don’t click it yet. Pop-ups that pressure you to “update now” are a common malware trick.

A few quick checks:

  1. Where did it appear? Browser tab, system notification, or inside your antivirus app?
  2. What’s the exact product name it claims to be updating?
  3. Is there a URL or “Learn more” link you can see?

For now: close the pop-up (use the X; if it won’t close, use Alt+F4). Don’t enter credentials.

Tell me what app/browser you were using when it appeared.

10:12

It popped up in Chrome while I was on a news site. It says “Windows Defender Update Required” and the button says “Install Update”. The URL bar looked weird but I didn’t copy it.

10:13

That’s very likely a fake “scareware” page. Windows Defender doesn’t update via random websites.

Do this step-by-step (typical company policy safe path):

  1. Close the tab. If it re-opens, close Chrome fully.
  2. Disconnect from Wi‑Fi/VPN temporarily if the pop-up was persistent.
  3. Run updates the official way:
    Start → Settings → Windows Update → Check for updates.
  4. Open Microsoft Security (Windows Security) → Virus & threat protection → Quick scan.
  5. Clear Chrome site data for that site (Settings → Privacy & security → Site settings).

Have you clicked anything on the page, or did it download a file?

10:13

I didn’t click the install button, but I did click “Allow” on a little notifications prompt earlier (might have been the same site). No download that I noticed.

10:14

Good catch—allowing notifications is a common way they keep spamming pop-ups.

Fix it in Chrome:

  1. Chrome → Settings → Privacy & securitySite settingsNotifications.
  2. Under “Allowed”, find anything suspicious (news/random strings) → Remove or Block.
  3. Then go to Chrome → Settings → Reset settings → “Restore settings to their original defaults” (optional but helpful).

Then run the Quick scan as above.

Per most org policies, if you allowed notifications from an unknown site, you should report it to IT/Security so they can track the domain. Do you know your internal “Report Phish/Incident” method?

10:14

We have a “Report Suspicious” button in Outlook and an IT helpdesk chat. This wasn’t an email though—should I still report it? And should I disconnect from the network now?

10:15

Yes—still report it. Security teams want visibility on malicious domains even when it’s not email.

What to do now:

  • Network: If you didn’t click “Install” and nothing downloaded, you usually don’t need to disconnect. If the pop-up keeps reappearing, or you see a download you didn’t start, disconnect immediately and contact IT.
  • Report: Use IT helpdesk chat and include:
    1) the website you were on (or best guess)
    2) wording of the pop-up (“Windows Defender Update Required”)
    3) that you clicked Allow notifications
    4) time it happened + screenshot if possible
  • Confirm safe updates: Only via Windows Update / Company software center, never via browser pop-ups.

If you tell me your company tool name (e.g., Software Center/Intune/Jamf), I’ll tailor the exact “official update” path.

10:16
Scroll down to see the rest of the conversation
Sticker

Learner asks SecurePath Cyber Training’s WhatsApp concierge for assessment results; bot verifies details, shares score/pass status, and next steps.

WhatsApp
16:12
Battery
Battery
Battery
Logo
SecurePath Cyber Training
Business Organisation

Hi, can you tell me my assessment results for the SecurePath Cyber Training course? I want to know if I passed.

16:10

Hi! I can help with that.

To pull up your assessment result, what’s the email address you used to register (or your employee ID), and which course/cohort date was it? (e.g., Cyber Security Essentials – Jan 2026)

If you’d rather not share your email here, send just your employee ID and I’ll use that instead.

16:10

Sure — employee ID is 48217. Course was Cyber Security Essentials, session on 18 Jan.

16:11

Thanks. Give me a moment while I check your record for Cyber Security Essentials (18 Jan) under ID 48217

Result: 84%
Status: Pass
Pass mark: 70%

Nice work. Your strongest areas were phishing identification and password/security hygiene. If you want, I can also share a quick breakdown by module and the 2 questions you missed (with the correct reasoning).

16:11

Great! Can you send the breakdown and tell me if I get a certificate?

16:12

Absolutely.

Module breakdown

  • Phishing & Social Engineering: 92%
  • Passwords & MFA: 90%
  • Safe Data Handling: 78%
  • Device & Remote Working: 76%
  • Incident Reporting: 84%

Certificate: Yes — because you passed, your certificate is issued automatically. It’s usually available within 24–48 hours. You’ll receive an email link, and it may also appear in your learning portal.

If you don’t see it after 48 hours, tell me and I’ll escalate it to a tutor/admin to resend.

16:12
Scroll down to see the rest of the conversation
Sticker

Learner asks how to keep progressing after enjoying the course; chatbot suggests learning paths, practice ideas, and formal qualifications options.

WhatsApp
18:15
Battery
Battery
Battery
Logo
SecurePath Cyber Training
Business Organisation

Hey! I really enjoyed the SecurePath Cyber Training session last week. I don’t want to lose momentum—what can I do next to keep learning, and are there any recognised qualifications I could work towards?

18:10

Love hearing that. Let’s keep the momentum going.

First, quick question so I don’t recommend the wrong path: are you aiming for general cyber awareness, hands-on technical (SOC/blue team), or governance/risk (policies, compliance)? And what’s your current level—new to cyber, IT background, or already doing security tasks?

In the meantime, here are strong next steps most people can start immediately:

  • Pick one topic and go deeper (phishing, passwords/MFA, data handling, incident reporting).
  • Do weekly “spot-the-risk” practice: review emails/links/requests and decide what you’d do.
  • Build a personal checklist for common scenarios (suspicious email, urgent payment request, unexpected MFA prompt).
18:10

I’m in IT support, so I’m fairly technical. I’m leaning towards blue team / SOC in the long run. I can probably study a few hours a week. Qualifications wise I’ve heard of Security+ and maybe some Microsoft ones?

18:11

Perfect—IT support is a solid base for a blue team path.

A practical progression (few hours/week) could look like:

  1. Core cert: CompTIA Security+ (great “security foundations” badge for employers).
  2. Microsoft security fundamentals: SC-900 (good if your org uses M365/Azure).
  3. Role-focused: SC-200 (Security Operations Analyst) if you want SOC/incident response.

To make the learning stick, pair the cert study with hands-on reps:

  • Practice investigating: logs, alerts, basic triage, and writing short incident notes.
  • Build a small “home lab” mindset: understand MFA, conditional access concepts, endpoint protection basics.

What tools do you touch today—Microsoft 365, Azure, Google Workspace, or something else?

18:11

Mostly Microsoft 365. We don’t have Sentinel in my team, but we use Defender and we get phishing tickets. I’d like to get better at investigations and incident response. Also—how do I know if I’m ready for Security+ vs going straight to SC-900?

18:13

Given your day-to-day, you’re already in a great place to start.

Security+ vs SC-900:

  • SC-900 is lighter and Microsoft-focused. If you want a quick win (2–4 weeks at a few hours/week), start here.
  • Security+ is broader and more “industry standard.” If you’re comfortable with networking basics, common attack types, and security terminology, you can begin it now—most IT support folks can with a bit of ramp-up.

If your goal is SOC, a smart route is SC-900 → Security+ → SC-200.

For investigations practice using what you already see:

  • Create a repeatable phishing triage checklist (sender, headers, links, payload, user impact).
  • Write a 5-line incident summary for each ticket: what happened / scope / action taken / containment / follow-up.

If you tell me roughly how comfortable you are with networking (DNS, HTTP, ports), I’ll suggest which to start first.

18:13

I’m okay with DNS/HTTP/ports but not super confident. I can follow logs but sometimes I’m not sure what “normal” looks like. Could you suggest a simple 8–10 week plan? Also any resources you recommend?

18:15

Here’s a simple 9-week plan (3–5 hrs/week) aimed at building SOC-ready habits while you prep for SC-900 and foundational knowledge for Security+.

  1. Week 1–2: SC-900 basics (identity, MFA, Zero Trust, shared responsibility).
  2. Week 3: Networking refresh (DNS, HTTP/S, TLS, common ports, phishing anatomy).
  3. Week 4–5: Incident process: triage → contain → eradicate → recover → lessons learned (write short reports).
  4. Week 6–7: Microsoft Defender concepts: alerts, endpoints, email threats, common detections.
  5. Week 8: Threats & controls mapping (malware, ransomware, credential theft → what stops/detects it).
  6. Week 9: Mock week: take 3 phishing tickets (real or sample) and document investigation end-to-end.

Resources:

  • Microsoft Learn for SC-900
  • CompTIA Security+ official objectives (use as a checklist)

If you want, tell me your weekly availability (e.g., 3 evenings vs weekends) and I’ll turn this into a calendar with milestones.

18:15
Scroll down to see the rest of the conversation
Sticker

Overview

A cyber security training provider delivers high impact learning programmes for large organisations. Their sessions are often delivered as big group events where hundreds of employees need to absorb practical guidance quickly and apply it immediately in their daily roles.

While the training days were successful, the business faced a familiar challenge. Questions did not stop when the session ended. Learners needed reassurance when they encountered real situations at work but tutors could not be available to everyone at all times.

The challenge

The company needed a way to support learners beyond the classroom without adding major pressure on tutors or expanding support headcount.

Key issues included:

  • Learners had questions outside session hours
  • People felt hesitant to ask questions in front of large groups
  • Tutors were receiving repeated queries across multiple cohorts
  • The business had limited visibility of which topics were confusing learners most
  • Post course support depended on email threads that were slow and inconsistent

Why WhatsApp was the right channel

The company wanted support to be as frictionless as possible for busy employees.

WhatsApp offered a strong fit because it provided:

  • No apps to download
  • No new logins or passwords
  • Personal familiar experience

For learners, it meant help was available in the same place they already communicate every day.

How the WhatsApp chatbot was implemented

The company deployed an AI powered WhatsApp chatbot using Voxd as a cyber security concierge for learners.

The chatbot was introduced as a key part of the training experience, positioned as a safe place to ask questions privately at any time. During and after training, learners could use it to:

  • Clarify concepts from the course
  • Ask how to respond to common cyber scenarios
  • Get guidance aligned to the organisation’s policies and best practice
  • Interact with course tutors when human input was needed

This created a blended support model where AI handled the majority of questions instantly and tutors could focus on the most complex or high risk issues.

Benefits and results

Always on learner support

With 24 7 availability, learners could ask questions when issues actually happened. That improved confidence and reinforced good habits at the moment of need.

Faster answers at scale

Instant responses removed delays from email based support. The chatbot could handle multiple learners at once which was particularly valuable during large events and immediately after sessions when question volume peaked.

Better engagement during training

Learners who were reluctant to speak up in a crowded room could still get help. This increased participation and helped the company support a wider range of confidence levels.

Consistent guidance and less repetition for tutors

Many queries were common across cohorts. The chatbot delivered consistent answers which reduced repeated explanations and freed tutors to spend more time on advanced questions and higher value coaching.

Improved course content through insight

A major operational benefit came from visibility. The training company could see what learners asked and analyse the answers.

That data was used to:

  • Identify gaps in understanding
  • Spot patterns by topic and cohort
  • Iteratively improve the chatbot answers
  • Update course materials to address recurring confusion

Over time, this created a continuous improvement loop where the training content became more targeted and the support experience became more accurate.

Ongoing post course value

After completing the course, learners retained access to the cyber security concierge. This extended the impact of training beyond a single event and helped employees apply secure behaviours in day to day work.

Practical examples of impact

Real time reinforcement in the workplace

When an employee encountered a suspicious email or an unexpected request for sensitive information, they could quickly check what to do and what not to do. This reduced uncertainty and encouraged safer decisions.

Tutor time focused where it matters

During peak periods, the chatbot handled routine clarification so tutors could prioritise nuanced questions, organisation specific edge cases and scenarios that required expert judgement.

Training shaped by real learner needs

Instead of relying on post course surveys alone, the company used question trends to refine modules, strengthen explanations and add emphasis where misconceptions were most common.

Conclusion

By combining Voxd with WhatsApp, the training provider turned support into an always available service that learners actually used. The business delivered a smoother training experience, strengthened long term learning outcomes and gained clear insight into what learners struggled with most, all while keeping tutor workload under control.

Please note: While this case study is based on a real project, business names, branding, and other identifying information have been modified to protect client privacy.

Logo
Privacy Policy | Terms of Service
© 2026 Voxd AI Ltd. All rights reserved.
Voxd AI Ltd is a company registered in England and Wales (Company No. 16911937).
Registered Office: Wharf Cottage, Daneway, Sapperton, Gloucestershire, GL7 6LN
24 7 Cyber Security Training Support Through a WhatsApp Concierge - SecurePath Cyber Training | Voxd Case Study