Phishing awareness · Spot it, stop it, report it
Most credential harvests still arrive as plausible messages, not Hollywood malware. This focused Phishing Awareness catalogue path covers what phishing and smishing look like, common pressure tactics and spoofed sender patterns, then the calm response chain (pause, verify, report) so people know what to do without fearing they will be judged for flagging a false alarm. The scored quiz blends simulated inbox threads (pick the phish), a branching messenger-style urgency scenario, hotspot scrutiny on a suspicious message or graphic, and knowledge questions so completion reflects hands-on recognition, not skim-reading.
Catalog · Phishing Awareness: Spot It, Stop It, Report It
Phishing Awareness: Spot It, Stop It, Report It · what learners experience
Doubt unsolicited links across email, SMS or chat: NCSC-style behaviour your policies already expect. This module is phishing-only; passwords, devices and patching stay in your wider cyber track.
Content trains escalation over heroics: smishing, forged IT mail, urgency plays, dodgy senders—then pause, verify on a known channel, report without shame. The capstone is a mixed quiz (inbox hunts, branching urgent-chat lures, hotspot graphics, recap MCQs), scored at eighty percent as authored.
- See it: phishing defined, convincing message cues, classic pressure tricks (panic, bogus authority, bad links)—blame lands on attackers, not staff.
- Stop it: interrupt the click muscle memory, sanity-check via trusted routes, summon IT calmly; collaboration beats staying quiet.
- Prove it in the quiz: inbox simulations, urgent-chat branching, hotspot hunts, recap MCQs—eighty percent pass as authored.
What employees finish clear on
- •Differentiate phishing family traits across email versus SMS versus chat surfacing behaviours.
- •Challenge internalised shame about hovering over “Report phishing” queues so security teams gain telemetry earlier.
- •Articulate minimally sufficient next steps aligned to your playbook (isolate, escalate, preserve headers) remembering policy always leads technical detail locally.
TrainMeUK evidences completions and mastery scores from this course, including quiz simulations baked into the module. Organisation-wide live phishing simulation vendors, SOC triage tiers and MFA enforcement remain separate security-engineering choices layered on top.
Wire in your phishing report address and IT branding
Swap generic “IT Department” lettering for your tenant’s real service desk banners, phishing submission aliases, Slack slash commands, regional language variants where frontline crews need them. Ordinary slide tuning typically stays licence-side unlike major bespoke authoring.
- Branded phishing quiz stems so muscle memory tracks your SSO and intranet quirks.
- Link-out to phishing reporting guidance your security team publishes on SharePoint.
This module supplements but does not automatically replace mandated wider cyber-security awareness where your frameworks still expect passwords, patching and device coursework.
Why phishing gets its own module beside broader cyber security awareness
Quiz simulations, not theory alone
In-course inbox-style thread pickers, branching messenger urgency and hotspot inspection sit beside knowledge checks, so scepticism is rehearsed on realistic surfaces.
Targeted phishing muscle memory
Deliberately narrower than holistic cyber breadth so scepticism drills sit in a repeatable cadence quarterly or onboarding.
Executive air cover
Normalize reporting when leadership completes the same module through Azure groups without exceptions.
Reminders beside Teams phishing buttons
Pair Teams awareness prompts with phishing-button adoption campaigns your security champions run.
When phishing training is a single annual animation, inboxes still refill with AI-smoothed lures every Monday
- •SOC teams plead for phishing submissions while busy staff hoard suspicious mail out of misplaced politeness.
- •Smishing slips past email-only curricula when BYOD mobiles never touch the LMS mandate.
- •Auditors ask whether Microsoft 365 phishing-button rollouts correlate with evidenced training completions.
- •Third-line support bleeds Saturdays because users forward chain letters instead of sanctioned report paths.
Operate phishing awareness completions alongside catalogue Cyber Security Awareness or AML modules sharing one TrainMeUK identity fabric: Azure assignments, SSO, Teams escalation, dashboards. Security owners stop reconciling phishing completion CSVs hacked out of a bespoke SCORM host separate from LMS truth.
What improves once phishing awareness is assigned, measured and refreshed in TrainMeUK
- Schedule phishing refreshers quarterly or annually mirroring SOC risk appetite without manual spreadsheets.
- Segment retail versus corporate cohorts knowing both appear in coherent completion exports.
- Feed board packs defensible numerator/denominator around awareness coverage before BEC drills.
- Pair training completion data with phishing simulation uplift metrics when your programme matures.
Recognition habits, safe response steps, reporting culture
- •Phishing modalities spanning email spoofing urgency through SMS “smishing” into workplace-chat analogues referencing Microsoft ecosystem habits.
- •Observable sender and language tells plus social engineering pressure psychology suitable for desk-based and hybrid teams.
- •Stop-verify-report sequencing emphasising legitimacy checks through known channels versus replying inline.
- •Reporting uplift narratives: organisational learning loops when IT receives early alerts.
- •Assessment mix: repeated inbox identification simulations, a branching messenger social-engineering path, hotspot inspection of a suspicious asset, and complementary questions on reporting etiquette, leadership vulnerability and when to escalate.
Course library and wording may be tailored to your policy; TrainMeUK is the assignment, reminders, completions, and evidence layer regardless of catalogue mix.
Further reading: cyber obligations, ISO & Cyber Essentials context, evidencing uptake
Curated Articles from TrainMeUK clarify UK obligations, supervisory expectations, and how to demonstrate training evidence alongside LMS deployment (not instead of bespoke legal counsel where you need it). Browse everything in Resources.
- Cyber security training requirements for employees (UK SME guide)
- ISO 27001 & Cyber Essentials: why security training matters
- Mandatory training requirements for UK businesses (baseline list)
- What UK auditors typically look for in training evidence
- Why training records fall apart across UK multi-site organisations
- Who owns training compliance in UK businesses, and how to prove it
Questions we hear about workplace phishing awareness
Is this catalogue Phishing Awareness the same authoring as Spot It, Stop It, Report It on TrainMeUK?›
Roughly how long should people allocate?›
How does this relate to catalogue Cyber Security Awareness?›
Which groups should enrol first?›
Can we align branding to phishing-button campaigns?›
Does TrainMeUK send simulated phishing payloads?›
How does pricing work?›
Ready to assign this training?
Start a trial or talk to us about multi-site rollouts and Azure AD.