โ†‘
Your Team Is Your First Line of Defence

Training That Changes Behaviour.

Hands-on sessions using real scenarios from your actual work. No death by PowerPoint. Behaviour change or we run it again.

0%
of breaches start with human error
0%
reduction in phishing clicks post-training
R0K+
avg savings vs breach recovery

What We Train On

๐Ÿ”

Security Awareness

Realistic phishing simulations using your company branding. Custom scenarios based on attacks targeting your industry in South Africa right now.

โš–๏ธ

POPIA & Data Protection

Every department trained on personal information handling, consent, and breach response. Plain language, real examples from their actual daily tasks.

๐Ÿค–

AI & Automation Adoption

Hands-on training on the specific AI tools you've deployed. Prompt engineering, output verification, and daily workflow integration.

๐Ÿ’ป

IT Skills Development

Training on your actual tools in your actual environment. People learn by doing the work they'll be doing tomorrow.

๐Ÿ›ก๏ธ

Incident Response Drills

Tabletop exercises simulating real incidents. Your team practises the response before they need it for real.

๐Ÿ“š

Custom Programs

Designed around your requirements, tech stack, and current skill level. One-off workshops or ongoing monthly sessions.

Scenarios We Simulate

These aren't theoretical. They're the attacks that hit South African businesses every week.

The CEO fraud email

Your CFO receives an email from the CEO (spoofed) asking for an urgent wire transfer. The email comes at 4:30pm on a Friday. The tone is urgent. The bank details are different from usual. Your CFO has 10 minutes to decide. In our training, we simulate this exact scenario and teach your finance team the verification steps that prevent a R2 million mistake.

The helpful USB drive

Someone leaves a branded USB drive in your parking lot. Or your lobby. Or your bathroom. Your staff find it and plug it in to see what's on it. In our training, we explain what a Rubber Ducky is, what happens in the 3 seconds after it's plugged in, and why curiosity is the most exploited vulnerability in cybersecurity.

The Teams message from IT

Your staff get a Teams message from 'IT Support' asking them to click a link and verify their credentials because of a 'security update'. Looks legitimate. Uses the company logo. Comes from a slightly misspelled domain. 30% of untrained staff fall for it. After our training, they screenshot it and send it to the real IT team.

The Numbers Don't Lie

Before security training

  • 42% of staff click simulated phishing links
  • 15% enter credentials on fake login pages
  • 3% report suspicious emails to IT
  • Most can't identify a spoofed sender address

After 3 months of training

  • Click rate drops to under 8%
  • Credential submission drops to under 2%
  • Report rate rises above 45%
  • Staff actively flag real phishing attempts weekly

Delivery Formats

Half-Day Workshop

Duration3-4 hours
Best forSecurity awareness, POPIA basics, tool-specific training
IncludesPresentation, live demos, hands-on exercises, take-home reference guide
ParticipantsUp to 30 people

Full-Day Intensive

Duration6-7 hours
Best forSystem migrations, AI adoption, incident response drills
IncludesTheory + extended hands-on practice + scenario exercises + Q&A
ParticipantsUp to 20 people

Monthly Programme

Duration2 hours per session, ongoing
Best forContinuous security awareness, gradual AI adoption, skills development
IncludesMonthly session + phishing simulations + progress tracking + adoption metrics
ParticipantsFlexible

How We Train

Custom content. Hands-on delivery. Measured results.

01

Assess

Evaluate current skill levels and identify gaps. We run baseline assessments (phishing simulations, knowledge tests, or skills evaluations) so we know exactly where your team stands. No assumptions.

02

Design

Custom programme built around your tools, your workflows, and your risk profile. No generic slides. Every exercise uses scenarios relevant to your industry and your actual systems.

03

Deliver

Hands-on sessions. On-site, remote, or hybrid. Your team learns by doing, not by watching. We don't lecture for 4 hours and hope something sticks. Short theory, long practice.

04

Practice

Real exercises using your systems and your scenarios. Phishing simulations. Incident response tabletops. Tool-specific tasks. We don't move on until people are confident, not just exposed.

05

Follow Up

30-day adoption check. Are people using what they learned? Are phishing click rates dropping? Are the new tools being used daily? Training isn't done until behaviour changes. If it hasn't, we adjust and run another round.

Works Better Together

These services give your team context for what they're learning.

Would your team pass a phishing test right now?

Free baseline phishing simulation. We send a realistic test to your team and show you who clicks, who reports, and who ignores it. No judgement. Just data you can act on.