What to know more?

Get in touch with
the experts in all things IT

Security Awareness Training

Old school Security Awareness Training doesn’t hack it anymore. Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks.
  • What is Security Awareness Training
    Baseline

    Baseline Testing
    We provide baseline testing to assess the Phish-prone percentage of your users through a free simulated phishing attack.

    Train

    Train Your Users
    The world’s largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters. Automated training campaigns with scheduled reminder emails.

    Phish

    Phish Your Users
    Best-in-class, fully automated simulated phishing attacks, thousands of templates with unlimited usage, and community phishing templates.

    See

    See The Results
    Enterprise-strength reporting, showing stats and graphs for both security awareness training and phishing, ready for management. Show the great ROI!

  • Phishing Emails

    We will monitor your employee phish-prone percentages over time and watch how performance from your initial baseline phishing test, after 90 days, and 1 year compares. With regular phishing security tests and security awareness training campaigns, you’ll see how your Human Firewall improves over time helping to reduce risk and improve your IT security defense. You’ll have real-time stats which will help you keep a pulse on how your security awareness program. Great intel to share with your management team!

  • Training Access Levels

    Kevin Mitnick Security Awareness Training specialises in making sure employees understand the mechanisms of spam, phishing, spear phishing, malware and social engineering; and are able to apply this knowledge in their day-to-day job.

    Trainees get unique job-aids: Social Engineering Red Flags™ with 22 things to watch out for in email, and 20 ways to block Mobile Attacks (PDF).  The Training Campaigns do the heavy lifting of getting your users through their training.

  • Why are we different?

    We’re a team of free-thinking techies, who look at IT security issues a little differently. Where other IT security companies may value profits, we value, well…security, and a strong human firewall. We are not in the pocket of any of the large players.

Get a quick quote. Let's begin!

1
How can we help you?
Select the types of IT services that you would like to look at or review (more than one iis OK).
2
Let us find our about you
Which company profile fits you best?
3
What brings you here?
Whilst we think IT is really cool, we appreciate you probably came here for one of the following.
4
Thank you
Great job. Just need your details and we will cal to assist you shortly.
Name is required
Invalid email
Email is required

Protecting your business reputation against Cyber risks

Cyber risk is any risk associated with financial loss, disruption to operations or damage to an organisation's reputation from a negative event impacting the organisation's information and/or information systems.
  • CYBER SECURITY HEALTH CHECK

    A Cyber Security Health Check will give you a comprehensive assessment of the health of your cyber security defences. We will perform an extensive review of your security program to identify and assess vulnerabilities and weaknesses in your security posture. At the completion of the engagement, we provide you with an in-depth analysis of the health of your enterprise and expert guidance on how to address any gaps and make improvements. We can also benchmark your cyber maturity against your peers within your industry.

  • PENETRATION TESTING AND POSTURE ASSESSMENT

    Our comprehensive penetration testing services mimic the actual tactics, techniques and practices that real world attackers would use to attack your systems. We can help you find any weaknesses that you might have before the bad guys do.

  • VULNERABILITY ASSESSMENT

    Do you know which of your web applications, databases, servers and network devices are most vulnerable to hackers? Do you understand your level of exposure? Before you can secure your systems and environment, you need to understand where your weaknesses lie. A vulnerability assessment will identify, document and assess weaknesses in your information systems and allow you to take pro-active measures to plug the holes before they are used to breach your defences.

  • DISASTER RECOVERY AND BUSINESS CONTINUITY

    We specialise in designing and implementing disaster recovery and business continuity programs for organisations of all sizes in any industry.

The industry solution, created through experience!

Transportable. Affordable. Real collaboration that makes sense. Now there is a better way, because we’ve built it.
What to know more?
Get in touch with the experts in all things IT
Contact Us