HEAnet Cyber Security Packages 2022

Free Phishing Simulations, User Awareness,

Vulnerability Scans and Classroom Led Training

Understand Your Risk To Phishing Attacks and Unpatched Security Vulnerabilities

Raise Awareness Of The Importance of Cyber Security

PROMOTIONS Valid until 30th June 2023

Continually Reduce Your Risk and Exposure To Common Cyber Threats

Jisc’s Cyber Impact report examines the impact of cyber security incidents and breaches across the sector. It highlights that ransomware has severely impacted institutions over the last couple of years and is often the result of phishing attacks and/or exploited vulnerable unpatched systems.

New low-cost cyber security packages and promotions now available, for HEAnet Clients, as part of the JISC Single Supplier Framework for Simulated Phishing and associated training, that help assess your security posture by identifying risks associated with phishing attacks and unpatched security vulnerabilities.

Success Stories Across the Sector

We have many HE and FE customers who have used our cyber security services, purchased using the Jisc Frameworks in the UK, thereby saving time and cost by not having to conduct procurement exercises themselves. Read some of these success stories:

“Educate your users for effective protection against phishing attacks” – Case Study at Guildford College.

“Phishing attacks – How to reduce your exposure” – Case Study at Leeds University.

“How to minimise your cyber attack exposure”Case Study at Coleg Cambria

Running simulated phishing attacks as part of a security awareness campaign, is a highly effective way to alert users to the variety of different tactics employed by malicious actors attempting to gain access to your data and/or credentials via phishing”. Jack Field, Cyber Security Team Lead Read more


Cyber Security Service Add-ons

Secure The Data Centre Initiative: Gain an affordable SOC service for 24x7x375 Cyber Threat Protection and Prevention – Read more.

Ransomware Response Security Playbooks: Automation and response packages with investigation and remediation capabilities.

Security Control Validation: Measure how effective your security tools are and if they are actually protecting you.

Network / Cloud Visibility: What apps in use, are they a threat, have you been compromised.

Cloud Audit: Analyse your public cloud infrastructure, looking at posture and workloads.

SaaS Audit: Classify data, sharing/permission visibility, threat detection within the apps.

Penetration Testing: Check your systems for exploitable vulnerabilities and weaknesses.

For any specific requirements, please let us know using the form below.

PROMO 1: Assess & Reduce Risk

Assess your security posture – Identify & validate improvements + staff  training

  • 2 * Customised Phishing Simulations
  • 2 * Risk Prevention Reports
  • 2 * External Vulnerability Assessment Scans

Promotion: FREE Services

  • 2 * Training Services: Awareness portal, materials,  videos, quizzes and report.
  • 2* Post Simulation consultation with our experts: Review Report, Findings / Comparisons and Recommendations.
  • 2 * External Vulnerability Assessment Scans.
  • 1 * Cyber Security 101 Classroom Instructor-led Training (virtual – no attendee limits).

PROMO 2: Continually Assess & Train

PROMO 1 + Continual Phishing Attack Awareness and Protection

  • 4 * Customised Phishing Simulations
  • 4 * Risk Prevention Reports
  • 4 * External Vulnerability Assessment Scans

Promotion: FREE Services

  • 4 * Training Services: Awareness portal, materials,  videos, quizzes and report.
  • 4* Post Simulation consultation with our experts: Review Report, Findings / Comparisons and Recommendations.
  • 4 * External Vulnerability Assessment Scans.
  • 2 * Cyber Security 101 Classroom Instructor-led Training (virtual – no attendee limits).

Secure The Data Centre Initiative

Gain an affordable SOC service for ‘around the clock’ Cyber Threat Protection and Prevention

Working in partnership with our strategic customers, understanding their challenges and requirements for 24x7x365 cyber threat monitoring, response and protection, we have launched our “Secure The Data” initiative designed for organisations regardless of size. It helps customers implement a quick and affordable SOC service that secures their data centre mission critical systems that can then be expanded based upon their requirements and priorities.

Threats On The Continual Rise

Cyber criminals are constantly seeking weaknesses across all organisations. The most common cyber threats that our HE and FE sector customers are experiencing are those related to:

  • Huge rise in sophisticated phishing attacks compromising users and devices.
  • Vulnerable ‘unpatched’ systems still constantly being exploited.
  • Cyber security postures being neglected due to other priorities and how we now work.
  • The hybrid workforce creating both relaxed awareness and appreciation for cyber security

Working with our customers in helping them address these threats and the challenges, we have launched new cost-effective cyber security packages as part of Jisc’s cyber security frameworks for the education sector, helping them avoid the huge cost of an education sector data breach.

Simple Steps To Protect Your Institution

The packages designed for the education sector, address these key cyber security concerns by identifying:

  • The organisations overall risk to phishing attacks due to lack of user awareness: opens, clicks and compromises
  • Poorly or misconfigured infrastructures: user devices, email configurations, infrastructure and perimeter security
  • Vulnerabilities across infrastructures and servers, and how to fix them.
  • User awareness training needs – both short and long term.

We provide a consultative approach, with detailed prevention reports, that help institutions understand what the risks mean to them and how they can minimise their exposure to attacks. Jisc’s 16 Step Guide details the questions you need to ask to assess your cyber security posture – let us help you strengthen it!


Free Cyber Security Services, Awareness and Classroom led Training Days - Please complete the form and our team will send you a cost proposal. The promotion is based upon a purchase order/invoice before 30th June 2023.

UK: +44(0)345 272 0900
SA: +27 (041) 393 7608

I agree to receive communication on newsletters, promotional content, offers and events. Your information is confidential, KHIPU never sells or shares contact information.

Quote Request: Please confirm how many users do you have? *

Are you interested in a 24x7x365 SOC

Please send me details of current Promotions

*required field

Thank you, the KHIPU team will be in touch soon.

  • Gerrard Shaw, Network Support Officer
    Havering College

    "We decided to work with KHIPU Networks via the Jisc framework, as their simulated phishing and awareness offering was exactly what we needed and within our budget. We strongly recommend FE institutions explore the Jisc framework for this service, as we feel social awareness is vital for the on-going prevention of attacks” 

  • Dave Neild, Cyber Security Architect
    University of Leeds

    “The strongest and weakest layer of defence against phishing attacks are your users. It’s vital to understand your organisations risk to these cyber-attacks and be able to provide the necessary awareness training and tools to limit your exposure. Using the Jisc framework for simulated phishing and awareness training, provided by KHIPU Networks, we have been able to test our security posture and identify key areas to help protect the University from future attacks.”

  • Mark Tysom, Cyber Security Product Manager

    “We work hard to ensure that our members have access to high quality, cost-effective solution providers. We have worked with KHIPU for some years and this is the second time it has earned our ‘top-ranked supplier’ accolade.”

  • Mark McKay, Head of ICT
    Guildford College Group (Activate Learning)

    “Using the simulated phishing services, provided by KHIPU Networks, gave us the ability to be one step ahead of attacks and offer an education on good practices to our users which they can use anywhere in life”

  • Rob Spalding, Head of Infrastructure
    Anglia Ruskin University

    “Using Jisc’s vulnerability assessment service enables the University to have a pro-active approach to cyber security. By having an automated solution that not only identifies vulnerabilities before they can be exploited, it reports on which systems will be affected and what actions need to be undertaken to protect them. This automated approach is vital in the defense against cyber-attacks including the recent ransomware which made headline news. The service, provided by KHIPU Networks via the Jisc VAS framework, has been an immediate success for the University, with a quick return on investment.”

  • Chris Adcock, Chief Finance Officer
    Duchy of Lancaster

    “KHIPU are competent cyber security trainers, who kept the audience attentive and interested. The content was pitched at a relevant level and had more than enough ‘food for thought’. The feedback that I had from the attendees was very positive and all felt the course worthwhile. As an employer, I also feel that this education will really help reduce the risk of an employee inadvertently compromising our network and they can no longer say that no-one told us. Very highly recommended.”

  • Lisa Quinn, Training & User Comms Manager
    Trinity College Dublin

    Trinity College Dublin, like most institutions, regularly experience phishing attacks via email therefore we have to find ways to protect our users and the University from being compromised. KHIPU, as an already trusted supplier, was selected to provide us with phishing awareness campaigns that included simulated phishing and follow up online education for our staff community. So far, we have found this approach has helped us highlight the dangers of Phishing which, in turn, enables us to educate our users and help protect against phishing attacks.”

  • Boeta Pretorius, Chief Director of IT
    North-West University

    “Our organisation like many others, is constantly dealing with cyber threats and attacks. When you have such a large number and diverse range of users, it's likely that an attack such as phishing will be successful, causing major problems such as crippled networks, confidential data leakage and damage to reputation. Whilst you have to invest into the right technologies and solutions to protect against these attacks, it's not always possible due to budget constraints. Even with heavy solution investments, its still the users who are the last point of defence against any attack.”

Proven and Simple to Procure

With over 100 happy customers plus endorsements from Jisc, these services are proven within FE and HE institutions, and are available by procuring through the following Jisc direct award frameworks thereby saving time and cost by not having to conduct procurement exercises themselves:

Simulated Phishing & Associated Awareness Framework

Vulnerability assessment service and tools supply framework: Lot 8

Network Equipment Framework: Lot 7 Palo Alto Networks

The packages are purchased directly from KHIPU and we fulfil the procurement via the applicable Jisc Framework category. For further information on the frameworks, please contact the KHIPU team or your Jisc Relationship Manager using the “Find your Relationship Manager” tool.

Join Our 15-min Webinars – All attendees get a FREE vulnerability scan

Please join our 15-minute webinars where we’ll present our cyber security services, promotions and customer success stories. These are hosted every Tuesday at 11:30 and Thursday at 14:30.

Can’t make the date? Not a problem, we will run one specifically for you – just register your details above.

A Network with Zero Vulnerabilities?

The enhanced packages are based upon our zero vulnerability infrastructure offering that help organisations identify their main risks and vulnerabilities to cyber attacks, so that recommendations can be made and implemented. The packages are built upon our very successful cyber security risk assessment services:

USERS Simulated Phishing Campaigns and User Training services

INFRASTRUCTURE Vulnerability Assessments: Internal and External scans

NETWORK TRAFFIC Cloud, Network, User and Application/Threat Visibility Assessments

All findings with best practise recommendations will be presented and discussed in detail with our cyber security experts and you, as part of a strategic alignment with your organisation.

Address The Sectors Top Cyber Threats

Analysing the results from recent education sector customer surveys to understand what the top cyber threats are, we launched a dedicated portal explaining how to solve these with solutions that are available via the Jisc Frameworks. The top concerns include:

  • Phishing, Ransomware – Malware
  • Shortage of Staff
  • Securing Public & Private Clouds
  • Government Guideline Compliance
  • Remote Working
  • Managing Cyber Security including Firewalls and SOC’s

Visit our “Addressing Top Cyber Threat Concerns” Portal to learn more.