We believe that people deserve to be educated about the cyber threats they face at home and in the workplace

A Leading UK Cyber Security Awareness Company

Our Mission

People need to make the correct cyber choices when faced with cyber threats.

With billions lost to cyber and information security attacks and breaches every year, human error stands as the largest contributing factor

Specialists in Security Awareness

To combat these avoidable incidents, we’ve created training that not only educates staff in how to avoid information security threats, but also allows organisation to track and understand their staff’s behaviour.

We help protect people and organisations by delivering the best security awareness programs.

What we Do

Our security awareness training is not only engaging, bite sized and dare we say - enjoyable - but is also designed to provide continuous value to customers and end-users, at home and at work.

Business-to-Business Software-as-a-Service

With unique animation, interactive tutorial design, a highly customisable phishing simulator, and easy to use Learning Management System (LMS), Hut Six’s training facilitates awareness and compliance, all on one platform.

We solve the difficulty of delivering an impactful awareness program that impresses users and meets board requirements.

About Hut Six

Founded in 2016, Hut Six have worked with large multinationals, government agencies all the way down to small businesses.

Hut Six an alumni of The Alacrity Foundation, and is backed by Sir Terry Matthew's VC fund Wesley Clover, the Development Bank of Wales and other private investors.

Headquartered in Newport, UK, our growing team is building a product that provides continuous value, is automated where possible and provides a tailored experience at scale.

Pictured: Prof Simon Gibson CBE - Wesley Clover, Dr Carl Griffiths - Development Bank of Wales, Simon Fraser - Hut Six

Our Board

Prof Simon Gibson, CBE
Prof Simon Gibson, CBE, DSC. DL

Simon Fraser
Simon Fraser

Managing Director
Daniel Steward
Daniel Steward

Technical Director
Mike Doyle
Mike Doyle

Non Executive Director

Behind the Name

The name Hut Six is inspired by the codebreakers’ work at Bletchley Park during World War II, and the significance of the human error of the German operators that lead to the breaking of the Enigma. Initially working out of a small wooden hut, the team was eventually able to deduce the daily key of the enigma before breakfast time, giving Allied forces vital intel for the rest of the day. This breakthrough, made in 1940, was only possible due to the human error of the German Enigma machine operators, who included the same words in their daily reports; for example, the German word for weather (Wetter) in the daily weather report.

Using these known words and Alan Turing’s “bombe”, the team at Hut 6 in Bletchley Park could deduce the encryption key that was used for the day. As the Bletchley Park operation grew, the sector that had started in that small wooden hut retained their name Hut 6.

Alan Turing's Bombe

Start trial icon

Start your Free Trial

Sign up for a free, 14-day trial. Experience the platform and show it to your team before making any decision with no payment details required.

Start Now

Calendar icon

Book a Meeting

Meet with one of our team for a walk through of our solution and to help us gain an understanding of your security awareness requirements.

Pick a Time

Latest Blogs

What is Information Security?

What is Information Security?

Discover the secrets of Information Security. Learn how to protect your data with essential strategies and tools. Understand the key differences between InfoSec and cybersecurity, and see real-world examples of effective data protection in action.

What is Business Email Compromise (BEC)?

What is Business Email Compromise (BEC)?

Mastering Business Email Compromise (BEC): the ultimate guide to defending your organisation. Discover key attack strategies and proven defence tactics. Safeguard your business today.

AI and the Future of Spear Phishing

AI and the Future of Spear Phishing

Uncover the future of cybercrime. Explore how AI will revolutionises spear phishing, posing new threats to cybersecurity. Learn how to defend against these advanced attacks.

A Guide to AI Security Policy

A Guide to AI Security Policy

Delaying the implementation of an AI security policy is akin to leaving the door wide open for potential threats. Without adequate safeguards in place, sensitive information may be compromised, leading to regulatory non-compliance, legal ramifications, and loss of consumer trust.

Speak to us about your Cyber Awareness