cyber games

cyber security is about mitigating risk, technical and human. If your only as strong as your weakest link, taking a human approach to your cyber strategy is essential.  

make it informativememorablefun

cyber games

The CYBER GAMES Challenge gamifies a 10 Stage Cyber Security learning framework of international best practice standards for employees, members and stakeholders, and make it fun along the way.   Each stage has a short video and infographic, followed by a short assessment to make sure they weren’t asleep at the wheel. 

A certificate of completion is provided to all players, which can be revisited annually for businesses in need of visible cyber training records.  For businesses really looking to make it fun, we suggest a prize to really motivate and incentivise participation. #ipad? 

challenge features


certificate of <br>completion




full<br>lifetime access


access on <br> mobile & TV

cyber games challenge details

  • 10 components of “Lets Prep / Lets Play”
  • Library of downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion

1: Cyber Security Basics

2: NIST Framework

3: Physical Security

4: Ransomware

5: Phishing

6: Business Email Impostors

7: Tech Support Scams

8: Vendor Security

9: Email Authentication

10: Securing Remote Access

  • How to protect your equipment, data, devices & wifi networks.
  • How to make smart security business as normal.
  • How to identify, protect, detect, respond & recover.
  • Why physical security is critical & how to train employees.
  • How ransomware happens & how to protect yourself.
  • How phishing works and what you can do.
  • How to prevent business email impostors.
  • How a tech support scam works.
  • How to minimise 3rd party security risk.
  • What is email authentication & what to do if you are spoofed.
  • How to connect remotely to a network.
  • What to do if you’re attacked or scammed.
  • Basic knowledge of computers and IT in the workplace is needed.
  • A desire to understand and mitigate modern cyber risks is needed.
  • Board members, business owners, managers & staff responsible for the administration and safekeeping of sensitive information
  • Individuals and businesses who wish to advance their professional development.

who's the weakest link in your office?