LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • Microsoft Page View Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • 1. Research Scope & Objectives
  • 2. Data Collection Methods
  • 3. Data Processing & Analysis
  • 4. Ethical Considerations & Compliance
  • 5. Consent and Compliance
  • 6. Data Anonymization
  • 7. Security Measures
  • 8. Peer Review & Validation
  • 9. Continuous Improvement

Was this helpful?

Export as PDF
  1. RESOURCES

Research Methodology

At Keepnet, we follow a rigorous research methodology to ensure that our reports, whitepapers, and insights are reliable, data-driven, and actionable. Our research approach is designed to provide high-quality analysis of cybersecurity threats, human risk management, and security awareness trends. Below is an overview of our methodology.

1. Research Scope & Objectives

Before initiating any research project, we define the scope and objectives. This involves:

  • Identifying key cybersecurity challenges and emerging threats.

  • Understanding industry-specific security awareness gaps.

  • Aligning research with Keepnet’s mission to improve human risk management.

2. Data Collection Methods

To ensure data accuracy and comprehensiveness, we employ multiple data collection methods, including:

  • Primary Research:

    • Surveys and questionnaires were conducted with security professionals, CISOs, and IT leaders.

    • Interviews with industry experts and practitioners.

    • Controlled phishing and vishing simulations to assess real-world vulnerabilities.

  • Secondary Research:

    • Analysis of cybersecurity incident reports and threat intelligence sources.

    • Review of academic papers, industry whitepapers, and regulatory guidelines.

    • Monitoring of global cybersecurity trends through trusted organizations (e.g., NIST, ENISA, MITRE ATT&CK).

3. Data Processing & Analysis

Once data is collected, we process and analyze it through:

  • Quantitative Analysis:

    • Statistical modeling and trend analysis to detect patterns in security awareness training effectiveness.

    • Benchmarking against industry standards and best practices.

  • Qualitative Analysis:

    • Thematic analysis of interviews and open-ended survey responses.

    • Case study development to illustrate real-world security awareness challenges and solutions.

  • Machine Learning & AI Insights:

    • Use of AI-driven analytics to identify emerging threat patterns.

    • Application of Natural Language Processing (NLP) for analyzing large datasets.

4. Ethical Considerations & Compliance

All our research activities adhere to ethical guidelines and compliance standards, ensuring:

  • Anonymization and privacy protection of research participants.

  • Compliance with GDPR, CCPA, and other relevant data protection laws.

  • Transparency in data sources and methodology.

5. Consent and Compliance

This research was conducted with the explicit consent of participating organizations, which were fully informed about the study’s purpose and methodology. The analysis adhered to stringent data protection regulations, including CCPA and GDPR, ensuring the highest compliance and privacy standards.

6. Data Anonymization

All data was anonymized to protect privacy, ensuring no individual or organization could be identified directly or indirectly. Robust anonymization techniques were employed to maintain confidentiality throughout the research process.

7. Security Measures

8. Peer Review & Validation

Before publication, our research undergoes:

  • Internal Review: Validation by Keepnet’s cybersecurity experts and research team.

  • External Review: Consultation with independent cybersecurity researchers and industry analysts for credibility.

  • Reproducibility Testing: Ensuring that methodologies can be replicated for consistent results.

9. Continuous Improvement

We continuously refine our research methodology based on:

  • Feedback from industry experts and customers.

  • Advances in cybersecurity threat intelligence.

  • Technological developments in AI-driven security awareness training.

By maintaining this structured research methodology, Keepnet ensures that our insights remain at the forefront of cybersecurity knowledge, empowering organizations to build a resilient security culture.

PreviousProduct Update/MaintenanceNextRelease Notes

Last updated 3 months ago

Was this helpful?

Data security protocols, including encryption and secure storage, were implemented to protect customer data. Once no longer required, anonymized data will be securely deleted under .

📚
Keepnet’s data retention policy