Service Update
| Availability | July 9th, 2025 |
| Product(s) |
Email Security Cloud Gateway (CG), Awareness Training Email Security Cloud Integrated (CI), Awareness Training |
| Who's affected | All existing and Net-New Awareness Training customers |
Overview
This season focuses on cybersecurity awareness, particularly highlighting various types of phishing attacks and the importance of reporting security incidents. Each episode features different scenarios that illustrate the risks associated with technology use in everyday situations, emphasizing the need for vigilance and proper security practices.
What's changing
- This season aims to educate viewers about the various forms of cyber threats, the psychological factors that contribute to security lapses, and the importance of proactive measures in safeguarding personal and organizational information.
- New episode content covering AI-powered phishing attacks, stress and fatigue impacts, QR code dangers, vishing attacks, reporting importance, impersonation attacks, device sharing risks, phishing simulations, and multi-vector attacks.
Episode Summaries
| Main Title | Title | Topic | Category | Description | msgText |
| Leo_Likes_to_Role_Play | Leo Likes to Role Play | AI (FRAUDGPT) | phishing | After Wil uses ChatGPT to complete his self-evaluation, Jenny shows how AI is making it more difficult to identify phishing attacks. | Watch "Leo Likes to Role Play" and see how bad actors use AI to make phishing attacks harder to identify. |
| Power_Nap | Power Nap | STRESS AND FATIGUE | office hygiene | Jenny discusses how stress and fatigue make people more prone to error. | Watch "Power Nap" and see how stress and fatigue make people more prone to error. |
| Whats_My_Motivation | What's My Motivation? | QR CODES | phishing | Jenny uses a gif of Hugh to demonstrate the dangers of scanning suspect QR codes. | Watch "What's my Motivation?" and learn how some QR codes can be dangerous. |
| Rhymes_with_Jenny_Barton | Rhymes with Jenny Barton | VISHING | phishing | Jenny and Naomi make a series of prank calls to demonstrate the dangers of Vishing attacks. | Watch "Rhymes with Jenny Barton" and learn about the dangers of Vishing attacks. |
| My_Inner_Ostrich | My Inner Ostrich | REPORTING | office hygiene | Wil seeks Hugh's counsel after he inadvertently downloads a strange attachment. | Watch "My Inner Ostrich" and see why it's critical to report security mistakes immediately. |
| A_Tale_of_Two_Gemmas | A Tale of Two Gemmas | IMPERSONATION ATTACK | phishing | Gemma's twin sister visits from New York and inspires Jenny's conversation about impersonation attacks. | Watch "A Tale of Two Gemmas" and learn about the dangers of impersonation attacks. |
| Someone_Elses_Hands | Someone Else's Hands | SHARING DEVICES | infoprotection | Hugh becomes Jenny's example after he lets his niece borrow his BYOD device. | Watch "Someone Else's Hands" and see why we shouldn't let other people use our devices. |
| Is_This_a_Test | Is This a Test? | PHISHING SIMULATIONS | phishing | Jenny and Naomi discuss how phishing simulations better prepare employees to identify and avoid actual attacks. | Watch "Is This a Test?" and see how phishing simulations prepare us to identify actual attacks. |
Deployment Schedule
| Region | Date |
| ZA Full | Wednesday 9th Jul 18:00 Europe/London |
| UK, AU, Jersey, DE | Thursday 10th Jul 18:00 Europe/London |
| US, USB, CA | Monday 14th Jul 07:00 Europe/London |
Recommended actions
Acknowledging the vital importance of proactive measures is essential for effectively safeguarding both personal and organizational information. No further action is required.
Comments
Please sign in to leave a comment.