Cyber Security Awareness Training

Our cyber security awareness training provides your staff with an excellent understanding of the techniques criminals use to target your business, in turn enabling them to spot threats before they become a breach.

Users generally pose the single biggest threat to company security and so providing your staff with a good base understanding of real world threats and dispelling some of the myths surrounding both threats and protection can be one of the biggest security gains for the investment.

A photo showing students in a classroom in the 1940s

1940s Cyber Security Awareness Training

While many users anticipate a fairly ‘dry’ session, our training is entertaining, fun and engaging with an interactive quiz at the end. All attendees receive a certificate of achievement and follow up guides.

In addition to the immediate benefits of having staff educated in the cyber threat landscape, if your company does suffer a breach, user awareness training is one of the first mitigating factors the ICO (Information Commissioners Office) will look for when considering whether a company has taken reasonable steps to protect its data.

An excellent follow up activity to the cyber security awareness training is a phishing campaign to target your users and attempt to socially engineer them.

Given that a phishing campaign (and its variants) are the most common techniques used by a criminal to begin an attack or con, this is an excellent test and provides direct and quantifiable feedback on a per user basis.

For more information about user awareness training or phishing campaigns, get in touch!

  • The Threats: Reality Vs Myth

    Training starts with a discussion around how real the threat is, dispelling some myths and exposing the scale of the problem.

  • Hacking Techniques

    Explanation of the techniques used by criminals and examples of real live hacks.

  • Social Engineering

    Understanding how social engineers operate, how to protect yourself and an example of a real social engineering con.

  • Business Best Practices

    Key activities and processes companies need to follow.

  • Staying Safe at Home

    Users are targets both at work and at home, sometimes being targetedĀ  at home yet because of their job (due to lower defences), we provide practical advice and a take away guide on staying safe.

  • Review & Quiz

    Users are targets both at work and at home, sometimes being targetedĀ  at home yet because of their job (due to lower defences), we provide practical advice and a take away guide on staying safe.