The CYBER GAMES Challenge gamifies a 10 Stage Cyber Security learning framework of international best practice standards for employees, members and / or stakeholders.

1. Cyber Basics2. NIST Framework3. Physical Security4. Ransomware5. Phishing6. Email Impostors7. Tech Support8. Vendors9. Authentication10. Remote Access

This challenge includes:

10 components of “Lets Prep / Lets Play”
Library of downloadable resources
Full lifetime access
Access on mobile and TV
Certificate of Completion

What you’ll learn:

How to protect your equipment, data, devices & wifi networks.
How to make smart security business as normal.
How to identify, protect, detect, respond & recover.
Why physical security is critical & how to train employees.
How ransomware happens & how to protect yourself.
How phishing works and what you can do.
How to prevent business email impostors.
How a tech support scam works.
How to minimise 3rd party security risk.
What is email authentication & what to do if your spoofed.
How to connect remotely to a network.
What to do if you’re attacked or scammed.

Challenge content

Cyber Security Basics – Knowing some cyber security basics and putting them in practice will help you protect your business and reduce the risk of a cyber attack.
NIST Framework – You may have heard about the NIST cyber security framework, but what exactly is it? And does it apply to you?
Physical Security – Lapses in physical security can expose sensitive company data to identify theft, with potentially serious consequences.
Ransomware – It looks legitimate – but with one click on a link, or one download of an attachment, everyone is locked out of your network.
Phishing – It seems to be from one of your company’s vendors and asks that you click on a link to update your business account. Should you click?
Business Email Impostors – A scammer sets up an email address that looks like it’s from your company. Then the scammer send out messages using that email address. The scammer is what we call a business email impostor.
Tech Support Scams – You get a phone call, pop-up, message or email telling you there’s a problem with your computer, but often scammers are behind these.
Vendor Security – Your business vendors may have access to sensitive information, make sure they are securing their own computers and networks.
Email Authentication – Email authentication technology makes it a lot harder for a scammer to send phishing emails that look like they’re from your company.
Securing Remote Access – Employees and vendors may need to connect to your network remotely, so make them follow strong security standards before they connect.


Basic knowledge of computers and IT in the workplace is needed.
A desire to understand and mitigate modern cyber risks is needed.

Who this challenge is for:

Board members, business owners, managers and employees responsible for the administration and safekeeping of sensitive information
Individuals who wish to advance professional development.

Who’s the weakest link in your office?

Start your Challenge Today… its Always Free!


Created By: Certified By Pty Ltd
Last Updated: November, 2019
Language: English
Approx. Completion Time: 1.5 hours