Awareness Training - UK Season 3 - Jul 2025

Service Update

Availability July 9th, 2025
Product(s) Email Security Cloud Gateway (CG), Awareness Training
Email Security Cloud Integrated (CI), Awareness Training
Who's affected All existing and Net-New Awareness Training customers

Overview

This season focuses on cybersecurity awareness, particularly highlighting various types of phishing attacks and the importance of reporting security incidents. Each episode features different scenarios that illustrate the risks associated with technology use in everyday situations, emphasizing the need for vigilance and proper security practices.

What's changing

  • This season aims to educate viewers about the various forms of cyber threats, the psychological factors that contribute to security lapses, and the importance of proactive measures in safeguarding personal and organizational information.
  • New episode content covering AI-powered phishing attacks, stress and fatigue impacts, QR code dangers, vishing attacks, reporting importance, impersonation attacks, device sharing risks, phishing simulations, and multi-vector attacks.
Episode Summaries
Main TitleTitleTopicCategoryDescriptionmsgText
Leo_Likes_to_Role_PlayLeo Likes to Role PlayAI (FRAUDGPT)phishingAfter Wil uses ChatGPT to complete his self-evaluation, Jenny shows how AI is making it more difficult to identify phishing attacks.Watch "Leo Likes to Role Play" and see how bad actors use AI to make phishing attacks harder to identify.
Power_NapPower NapSTRESS AND FATIGUEoffice hygieneJenny discusses how stress and fatigue make people more prone to error.Watch "Power Nap" and see how stress and fatigue make people more prone to error.
Whats_My_MotivationWhat's My Motivation?QR CODESphishingJenny uses a gif of Hugh to demonstrate the dangers of scanning suspect QR codes.Watch "What's my Motivation?" and learn how some QR codes can be dangerous.
Rhymes_with_Jenny_BartonRhymes with Jenny BartonVISHINGphishingJenny and Naomi make a series of prank calls to demonstrate the dangers of Vishing attacks.Watch "Rhymes with Jenny Barton" and learn about the dangers of Vishing attacks.
My_Inner_OstrichMy Inner OstrichREPORTINGoffice hygieneWil seeks Hugh's counsel after he inadvertently downloads a strange attachment.Watch "My Inner Ostrich" and see why it's critical to report security mistakes immediately.
A_Tale_of_Two_GemmasA Tale of Two GemmasIMPERSONATION ATTACKphishingGemma's twin sister visits from New York and inspires Jenny's conversation about impersonation attacks.Watch "A Tale of Two Gemmas" and learn about the dangers of impersonation attacks.
Someone_Elses_HandsSomeone Else's HandsSHARING DEVICESinfoprotectionHugh becomes Jenny's example after he lets his niece borrow his BYOD device.Watch "Someone Else's Hands" and see why we shouldn't let other people use our devices.
Is_This_a_TestIs This a Test?PHISHING SIMULATIONSphishingJenny and Naomi discuss how phishing simulations better prepare employees to identify and avoid actual attacks.Watch "Is This a Test?" and see how phishing simulations prepare us to identify actual attacks.

Deployment Schedule

Region Date
ZA Full Wednesday 9th Jul 18:00 Europe/London
UK, AU, Jersey, DE Thursday 10th Jul 18:00 Europe/London
US, USB, CA Monday 14th Jul 07:00 Europe/London

Recommended actions

Acknowledging the vital importance of proactive measures is essential for effectively safeguarding both personal and organizational information. No further action is required.

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.