Inside The Faultline: Meet the People and the Threats

Every breach begins with a decision. Every decision begins with a person.
Welcome to the Awareness Faultline, where everyday choices can open the door to extraordinary risks.
Meet FiveAware: The Goodies

Jo Rowe — Owner / Director
"I just need to know what's essential, what's urgent... and what can wait."
Jo feels the pressure of leadership every day — juggling decisions, risks, and trade-offs. Driven, focused — but when the inbox fills up, what gets missed?
Valeria Cruz — HR / People Manager
"If it doesn’t make sense to the team, it won’t stick."
Valeria knows that policies alone don't create security, people do. Her challenge is making sure that new rules, processes, and tools aren't just delivered, but understood and embraced.
Baz Chu — IT Lead / Provider
"Don’t ask me to fix a human error with a firewall."
Baz can secure networks and patch systems, but he can’t patch human mistakes. He walks the tightrope between technical defences and the unpredictable reality of everyday staff behaviour.
Mo Taylor — Long-term Staff Member
"I've done it this way for years. It has been fine so far."
Mo brings experience and loyalty, but also old habits. Change feels unnecessary until something goes wrong, and trusting the old way can sometimes leave the door open.
Sky Dhillon — New Starter
"I'm new. I don't want to be the one holding things up."
Sky’s eager to make a good impression. But between new systems, new processes, and the fear of asking "silly" questions, even small doubts can snowball into big risks.
Meet Project Shadow: The Baddies

Payload — Malware / Ransomware Operative
"You clicked. I moved in. Now we do things my way."
Payload doesn’t need you to notice them. One click is all it takes to turn a minor mistake into total control, and they know exactly how to wait for the right moment.
Glitch — Insider Negligence / Human Error
"I opened the door they didn’t know was unlocked."
Glitch thrives on complacency. They don't need to hack, they simply wait for overlooked gaps, unchecked mistakes, and forgotten steps that leave the door wide open.
Lure — Phishing / Social Engineering Tactician
"Why hack when they'll hand you the keys?"
Lure is the master of manipulation. With a convincing message or a fake sense of urgency, they turn trust into vulnerability, making you hand over your secrets without even realising it.
CrackJack — Credential Breaker / Brute-Force Specialist
"Welcome123? Don’t mind if I do."
CrackJack loves predictable patterns. They exploit weak passwords, recycled logins, and security shortcuts, breaking in without ever raising an alarm.
GhostMesh — Shadow IT / Policy Evasion
"I hide in habits. I grow in shadows."
GhostMesh doesn’t smash down the front door, they slip quietly through the gaps when unofficial apps, personal devices, and ignored policies create blind spots no one’s watching.
Now that you’ve met the people and the threats behind the Faultline, it’s time to see how the first story unfolds...
