Cyber Shorts
Free cyber awareness training for everyone, in under 3 minutes each.
Choose a topic to get started!
At Hut Six we've decided to refine our training into an even more bite-sized format with Cyber Shorts and release them for free. We believe everyone deserves to be educated against cyber threats they face in the workplace and at home. Cyber crime can be just as distressing as a physical crime and we're here to help you protect yourself.
In these shorts, we cover the core concepts of security awareness in 180 seconds or less in our unique style. Share with your family and friends to help them level up their cyber game.
See how we can help your organisation build a secure culture
Start your Free Trial
Sign up for a free, 14-day trial. Experience the platform and show it to your team before making any decision with no payment details required.
Book a Meeting
Meet with one of our team for a walk through of our solution and to help us gain an understanding of your security awareness requirements.
Latest Blog Posts
A Guide to AI Security Policy
Delaying the implementation of an AI security policy is akin to leaving the door wide open for potential threats. Without adequate safeguards in place, sensitive information may be compromised, leading to regulatory non-compliance, legal ramifications, and loss of consumer trust.
Artificial Intelligence and Employee Security Training
There many reasons employees need AI security training, including mitigating emerging risks, protecting your organisations reputation, and avoiding non-compliance related fines/financial damage.
How do you Train Employees for Information Security?
Training employees for information security isn’t always easy. From choosing the right topics, to ensuring employees engage, and finding the right training, Hut Six is here to guide you in our security journey.
Explained: The Different Types of Security Awareness Training
To establish a robust defence against cyber threats, organisations deploy various security training methodologies. The four most common of which are: classroom, basic web-based, interactive web-based, and simulated phishing.