Key Features

Short phishing awareness courses

Our phishing awareness courses are short & sharp, designed for the time-restrained employee. Most courses are approximately 2-3 minutes long.

mortarboard hat icon

Completion certificates

Employees can celebrate their accomplishments with personalised course completion certificates.


Quizzes & assessments

Training courses include interactive games, quizzes and assessments to test employee knowledge.

globa icon

Real-world Examples

Courses are developed by certified cyber security professionals for the UK context and include real-life examples of scams & social engineering.


Clicks on Phriendly Phishing emails are used as a learning experience, showing employees what they should be looking for with regards to phishing emails.

link icon

Post-course surveys

We love feedback. Post-course surveys provide our team feedback to continuously improve our course offerings and deliver best-in-class training that learners actually like!

Training Feedback


employee satisfaction

mortarboard hat icon


learnt something new

3 stars icon

I learned a lot!

The style and tone was very engaging. It managed to pack in a lot of information in very easy to digest chunks.

I liked the mix of characters, instruction and quizzes. I really enjoyed the training and I learned a lot. Thank you!

3 stars icon

Confidence Building

I feel more confident in identifying scam emails.

3 stars icon


As an older person who is not confident on a computer, I now know what to watch out for in future

Keep Secure Mini

Module 3: 5 Rules to Keep Secure

Learners will discover the 5 rules to keep secure, which is designed to provide a clear framework for making intelligent ongoing security decisions.

Module 2: Social Engineering

Learners will discover where they might encounter cyber-attacks, the different types of social engineering attacks and how their online footprint and physical encounters could make them an easy target for attacks.

Module 1: Security Foundations

Learners will discover what motivates hackers, the different techniques they use to hack their victims, popular types of cyberattacks and how to protect themselves against these attacks.

General Security Awareness

Business Email Compromise

Employees will discover the simple, and highly effective scams using malware or social engineering in this short course.

Social Media

Your staff should be aware of the risks of sharing information on social media and how to apply safety measures to protect themselves, the organisation and their families.

Situational Awareness

This short course looks at the importance of implementing situational awareness effectively.

Passwords & Passphrases

Ensure your staff understand the important role of passwords in keeping information safe and secure.

Laptop Security

Your staff will leave this course with a solid understanding of how to protect this important piece of company hardware, their laptops.

Bring Your Own Device (BYOD)

Bring your own device (BYOD) provides familiarity and ease for users but having diverse technologies can cause significant disruptions to organisation security. Ensure your staff understand the security.

Remote Working


Educate your staff about the risks of Wi Fi and how to utilise this option safely.

Information Security at Home

Ensure your staff understand how to implement information security practices at home.

Remote Working

Outside your office, workers may miss or become desensitised to security. They’re often less clear about protocols and more likely to troubleshoot for themselves. Rein in ‘cowboy’ tendencies.

Device Security

Cultivate a cyber-savvy workforce that recognises information as an asset and knows their role in protecting it.

Keep Secure Mini Series

Keep Secure 5 modules

Centred on our signature Keep Secure 5 framework, staff will progress through 6 modules that help them master a security mindset across your entire enterprise


Information Security

Whether a dam wall is poorly maintained or maliciously damaged, it can result in a loss of precious water. Information is your water. Have staff secure it well.


Device Security

Cyber crims love that employees use their own devices for work because crims gain a less secure doorway to your data. Help workers slam that door shut.


Workplace Security

Cultivate a cyber-savvy workforce that recognises information as an asset and knows their role in protecting it.


Remote Working

Outside your office, workers may miss or become desensitised to security. They’re often less clear about protocols and more likely to troubleshoot for themselves. Rein in ‘cowboy’ tendencies.


Good information handling and security policies are only useful if people are aware of them and understand their roles in executing them effectively. If you’re looking for training that helps your people understand their accountability, you’ll find it here, with Phriendly Phishing.

Inside out or outside in: exposed data is still exposed data

Information security goes beyond just the measures you take to prevent malicious cyberattacks from outside your organisation. It’s also about the steps you take to ensure your organisation doesn’t leave data unprotected or exposed.

You can probably guess the legal and reputational fallout if your organisation’s internal memos, performance statistics, proprietary technology or other sensitive documents were published online for the world to see. You’re similarly obliged to safeguard your clients’, employees’ and suppliers’ identifying details and personal info from being publicly exposed.

Equip your staff to secure the asset most at risk—information

It is critical that your people understand their responsibilities for implementing information security and are trained in good security practices. With Phriendly Phishing’s information security awareness training, staff learn the importance of:

  • classifying, handling and disposing of information

  • not sharing their user identification or passwords

  • backing up their computers

  • only having authorised programs installed on their work computers and work phones

  • physically securing their work computers and work phones

  • not releasing confidential information unless authorised

  • securing data when working remotely

  • scanning incoming files and links

  • reporting anything that looks suspicious.

See Phriendly Phishing in action

Your staff need cyber street-smarts. Contact us today to see our phishing and cyber security awareness training in action.

Request Demo