Latest News
How to Stay Safe from the "Hello Pervert" Sextortion Scam
How to Tell if Your Security Awareness Programme is Actually Working
The Limits of Gamification in Cybersecurity Training: Why It’s Not a One-Size-Fits-All Solution
Unlocking Cyber Security Training for Your Neurodiverse Staff
Cyber Security Role-Playing: Stepping Into the Attacker’s Shoes
Cyber Security Quizzes: Testing Knowledge, Reinforcing Learning
Cyber Security Peer Review Sessions: Learning Through Collaboration
Cyber Security Hackathon: Innovating for Security
Cyber Security Roadshows: Bringing Learning to Your Team
Culture Gem Named Finalist for Security Education and Training Provider of the Year at the Computing Security Awards 2024
Cyber Security Storytelling Sessions: Sharing Real-Life Lessons
Cyber Security Lunch and Learn: Combining Learning with Social Time
Cyber Security Mythbusters: Dispelling Common Misconceptions
Cyber Security Bingo: Making Learning Fun
Cyber Security Escape Room: Hands-On Learning at Its Best
Phishing Simulation Contest: Think Like an Attacker
OSINT Challenge: Uncovering Hidden Information and Empowering Employees
Human Touch: Your Best Defence Against Phishing Scams
50 Engaging Cyber Security Activities for Continuous Awareness
The Importance of Accessibility in Compliance Training