Ghosts in the machine

June 1903 London.

Marconi was getting ready to demonstrate his long distance secure Morse code device to a select crowd gathered at the Royal Institute’s Lecture Theatre in London. While Marconi was on a cliff top in Poldhu, Cornwall preparing to send his transmission, physicist John Ambrose Fleming was adjusting the receiver in London. Suddenly, “as if by magic” the receiver began to tap out an unexpected message, “Qui vult  decipi, decipiatur” (Let him be deceived who wishes to be deceived).

It transpired that the demonstration had been hacked by inventor/magician Nevil Maskelyne.

To this day hackers highlight flaws in technology and lapses of security just like Maskelyne.

A little mischief has its virtues!

Ghosts in the machine

Cybercrime on the other hand, is the sinister side of hacking with potentially devastating effects on businesses.

In recent years there is a great increase on cybercrime incidents. These cyber-attacks have the potential to leak personal data and compromise customer accounts. They can also cause major financial complications that can directly affect your organisation. It is therefore essential that businesses of all sizes are aware of cyber security, how it can affect every day operations and how this can be prevented.

Cyber security is not just an IT problem

It is a business problem.


Due to advances in technology the way we work and live is changing, and so are today’s cyber-attacks. Most cyber-attacks exploit basic vulnerabilities. More than 90% of targeted attacks start with an infected email and these threats are always evolving. Updating your hardware and software security can be a meaningless exercise if the end users in your organisation are not properly trained to identify and deal with possible cyber security threats. Organisations are starting to understand the important role that individual employees play in helping to strengthen their organisation’s cyber security.

Holistic cyber safety

Holistic cyber safety

When it comes to cyber security, having the right technology, security policy and an IT strategy are a good start but employee training and awareness are the real key to preventing these threats from damaging your business. Cyber security awareness training provides the best way to educate personnel.


Empower and educate your employees at all levels, people are in the heart of holistic cyber security.


Something phishy is going on

Cyber security systems and principles are designed to safeguard IT infrastructure from attackers seeking to disrupt the flow of data. These attackers vary in target, motive and technical capabilities, however majority of hacks are initiated by employees clicking on emails containing some form of malware. Lack of cyber security awareness is responsible for the worst data breaches causing organisations to risk their reputation and customer trust as well as hefty sum of fines.

Achilles heel of cyber security

Think before you click

Humans are the Achilles heel of cyber security, therefore promoting security education has to be a priority.


The best defence against cyber security threats is the knowledge that comes with training. Cautious and security minded staff are well worth the investment. By ensuring you and your staff complete cyber security training, you will be able to help protect your business and data effectively against cyber criminals.

Holistic approach to your cyber security

Technology alone is not enough.

Even the best technological solutions can be rendered ineffective by improper human action. Holistic cyber security starts with creating a security-conscious workforce. Employee involvement is crucial for the success of an organisation’s security strategy. Our cyber security awareness training is suitable for businesses of all shapes and sizes. Training is delivered in a modular fashion in order to ensure that each subject area is fully explored.

Our cyber security training teaches you how to be more cyber security conscious through a series of entertaining and engaging courses. It only takes one person to cause a security breach, that’s why our modules are designed to deliver essential cyber security information in a clear and concise way.

Upon completion of this course learners will be able to reduce every day risks and understand the possible harm that can be caused using real life examples. You will gain a working understanding of the stats and information around cyber security, including the different types of malicious software.

Holistic cyber security strategies in synergy will increase the resistance of any organisation of any size.

Complete cyber security awareness training for your business

Configuring and training the ultimate human firewall.

Technological advances also transformed cyber security training. It is now widely acknowledged that cyber security starts with security conscious people.

Our training modules are based on 5, 15, 25 and 45-minute video segments to make sure employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering threats. They will then be able to apply this knowledge in their day-to-day job. Modules are presented on high quality web-based interactive sessions. Training also combined with common traps, live demonstration videos, short comprehension tests and scenario-based exercises.

Axisfirst Security Awareness Training includes,

Phishing reply tracker.
Live demonstration videos.
Emulated CEO fraud attacks.
Regular updates with fresh content.
Over 500 security awareness content.
Interactive modules containing videos and games.
Year around all you can use simulated phishing attacks.
On-demand, engaging, interactive browser-based training.
Customisable landing pages and automated phishing attacks.
Office templates with macros to simulate ransomware attacks.

Training reports.
Phish alert button.
UK based support.
USB drive test tool.
Targeted spear-phishing attacks.
Custom reports and dashboards.
Vulnerable browser plugin detection.
Geo-tagged failure reports and analysis.

Smart Groups & Easy User Management.

Cyber security evolves daily. Stay one step ahead or at least up to date. Do not assume that policies that were protecting you yesterday, will protect you tomorrow.

Modules by ex-hacker Kevin Mitnick

The phone whisperer!

Find out from first-hand how the hackers operate and how you can prevent this.

Some of our modules are presented by ex-hacker Kevin Mitnick whom once accused of “capable to start a nuclear war by whistling into a phone”!

This well-established, engaging new-school security awareness training is based on dynamic real-life examples and focuses on ever changing landscape of cyber security.

During the security training, you can set simulated hacking incident, phishing, spear-phishing and ransomware attacks which helps participants to think like a hacker and keep them one-step ahead of hackers.

Training includes various hacking techniques, social engineering mechanism, software vulnerabilities, intrusion testing, data, password and desktop security, indication of virus, malware, trojans, spyware and adware.

You will be exposed to real-world scenarios to show you strategies and the most common techniques hackers use to take control of your computer system. You will be taken behind the scenes to see how the bad guys do what they do.




Kevin Mitnick


Modules & Features



Training Content

Training modules 174 Training modules
Videos 161 Videos
Posters & Artworks 252 Artworks
Micro modules 66   Micro modules
Compliance Modules 51   Compliance Modules
Games 20   Games
Newsletters / Security One sheets 135 Newsletters
Reports  60  Reports
Possibilities    Possibilities




Unlimited phishing security tests Phishing tests
Automated security awareness program Automated program
Security hints & tips Security tips and hints
Smart groups Smart groups
Security roles Security roles
Phish alert button Alert
Phishing reply tracking Tracking
USB drive test USB test
Virtual Risk Officer Risk officer




Features cont.

Industry benchmarking Benchmark
Monthly email exposure check Email exposure check
Vishing security test Vishing test
Automated training campaigns Automated campaigns
Reporting APIs Reporting
Crypto-ransom guarantee Crypto-ransom guarantee
Social engineering indicators Social engineering indicators
Active Directory integration Active Directory integration
Priority level support Priority level support



Training is available from £48 per user per year.

Call us now to book 01278 421020.

Start phishing your users now

If you don't do it, the bad guys will..!


Over 90% of successful data breaches started with a spear phishing attack.

Technology can provide limited defence against phishing. Your end users are relentlessly bombarded with increasingly sophisticated spear-phishing attacks. They are often the target and the weakest link in your cyber defences.

There’s no completely fool proof solution, especially as the people running these scams get increasingly sophisticated in their approaches, the aim is to reduce the risk associated with these attacks.

Simulated phishing attacks let you test and educate your employees on how to spot phishing and avoid attacks.

By combining our phishing simulation and cyber security awareness training, you can offer a holistic training approach that will make your employees more resilient against these threats.


Start your test for up to 100 users.
Phishing test templates based on your environment.
Show users which red flags they missed, or a 404 page.
Get a PDF emailed to you with your Phish-prone % and charts to share with management.
See how your organization compares to others in your industry.


Fill out the form and get started.

Sign up for your FREE phishing test


Cyber security framework

Breach will eventually happen.

As with anything with a human factor, there can never be a 100% fool proof solution. People by their very nature will make mistakes. The focus here is to detect and contain a possible breach as soon as possible.

In 2014 (updated in 2018), NIST (National Institute of Standards and Technology) came up with following framework to provide a “prioritised, flexible, repeatable, performance-based, and cost-effective approach” to managing cyber security risk for critical infrastructure services.

Identify – Develop the organisational understanding to manage cyber security risk to systems, assets, data, and capabilities.

Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.

Detect – Develop and implement the appropriate activities to identify the occurrence of a cyber security event.

Respond – Develop and implement the appropriate activities to take action regarding a detected cyber security event.

Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event.


Cyber security has to win all the time, the hacker only once.

Call us to speak one of our specialists

01278 421020


Join our mailing list and keep up-to-date with all the latest business news and information from axisfirst.