From compliance to competence
Phishy or Not? replaces your phishing simulation and your learning module. One honest measurement of human risk.
Delivered through scenario-based play.
Built for the threats AI creates — across every channel your people face.











Phishing drives 85% of reported cyber attacks on businesses. Attacks have evolved. The training hasn't.
Simulations measure whether you click.
They don't build the instinct to question whether you should.
How Phishy works
Created by behavioural scientists, game designers and cyber professionals — to build instinct through play, and measure what matters: competence, confidence and change.

Audit-ready records included. For governance detail, see FAQ.
When training isn't a penalty, people do it voluntarily. The instinct compounds. And it goes home with them — protecting their family, not just your organisation.
Built on science. Tested in the field. Measured where it counts.
Independent controlled trial
Independent controlled trial

"The important difference is that we measure behaviour, not training completion or phishing test results — which research increasingly shows are ineffective."
Stacey Edmonds, Westpac Backing Business. Winter 2026
How to roll Phishy out across your organisation
No integration into your systems. Browser-based.
No software to install. No admins to train.
Three ways to run it:
- Full scenario library, updated continuously
- Per-signal susceptibility data, individual and cohort level
- Completion records mapped to compliance frameworks, exportable
- Optional SSO — no mandate required
- Custom brand, domain, and scenario library
- Dedicated Customer Success contact
- Priority access to new threat formats and product features
- Customer-facing branded deployment
- Behaviour-change and ROI measurement at customer cohort level
- Designed to sit alongside your customer communications calendar
- Flexible licensing based on customer base
Behaviour, belief, and the gap between them
Phishy generates real-time behavioural data across four dimensions of susceptibility. Use it to shape your awareness program, sharpen your risk reporting, and build your compliance evidence.
The 4 C's we track
See where skills are growing and where they are degrading.
Vishing, smishing, quishing, deepfakes and DMs. The threat moved beyond email.
So did we.
Phishy shows you which signs, which cohorts, and where to act.


Back your L&D and Risk teams with a Customer Success Squad
Admin onboarding, reporting templates, board-deck talk-tracks, compliance mapping, and a real human. We run alongside you, so your team runs the program, not the platform.
- Rollout playbook for L&D, HR, and Risk
- Board-ready reporting templates and talk-tracks
- Dedicated Customer Success contact

The questions your Risk, Procurement & Audit teams will ask
Our answers. Evidence in hand.
Per-user completion records with timestamps and scenario-level detail.
Ongoing scenario delivery, not annual. Daily Dodgy option. Confidence self-assessment every two months.
Scenario library covers SMS, email, game chat, DMs, voice, deepfakes, BEC, credential lures, and social engineering signals.
Quarterly content review. New scenarios added in response to current threats (deepfake voice, AI-generated lures).
84–86% reduction in phishing click rate (Deloitte, TOLL). Transport for NSW: click rate from 32.9% to 10.9% in players. 91% confidence uplift. NPS 9.8.
ISO/IEC 27001 certified hosting (SRA). AWS Sydney data residency. SOC 2 Type II on operational controls. Independent pen testing.
AWS Sydney for Australian buyers. Sovereign Australian provider. Home Affairs recognised.
Security pack includes ISO 27001 scope, SOC 2 report, pen test summary, privacy impact assessment, and NSW DoE information security alignment.
Platform identifies lower-performing individuals by signal. Behaviour-led remediation through scenario practice, rather than punitive retesting.
Executive dashboard: susceptibility index, confidence trajectory, scenario-level performance by team. Aligns with CPS 234, NIS2, and DORA board-reporting expectations.
Completion logs, content coverage mapping, effectiveness data, and ISO 27001 certification of the platform itself are all exportable and audit-ready.
Scenario content can be targeted to management cohorts. Supports NIS2 Article 20 and DORA management-body requirements.
The instinct to spot deception is the most neglected skill online. Not because people aren't smart enough. Because nobody built the right tool.
That's what we made.
Frequently asked questions
Days, not weeks. Typical enterprise rollout is under a week from contract to first scenario, because there is no system integration. White label adds two to four weeks for custom branding.
Yes. SAML 2.0, Okta, Entra ID, Google Workspace. SCIM provisioning available on request. SSO is optional — the platform also runs without it.
No, and that's the point. Phishy runs in the browser, outside your email and identity stack. It means no IT project, no procurement delays, and deployment in days not quarters. The measurement is stronger because scenarios are controlled and calibrated — they don't depend on what makes it through your spam filter.
English (AU, UK, US), with additional languages available on request for white-label and enterprise deployments.
Yes. Custom brand, domain, and scenario library. See deployment option 2 above.
A 60-minute admin onboarding session plus reference materials. Your Customer Success contact remains available for the life of the contract.
Hear from our clients
Latest News



