Security Awareness Videos

Award-winning security awareness content your employees can relate to

microlearning header microlearning header mobile

Original and high-quality content — from interactive videos to digital nudges

High-quality videos based on real-life scenarios with a dash of humor but no cartoons

Learn more

Quizzes, posters, stickers and checklists for your internal communication to keep cybersecurity top-of-mind

Learn more

White papers, learning tools and stakeholder analyses to learn from, get stakeholders buy-in or just share within the company

Learn more

AwareGO’s content is incredibly pointed. Videos make employees see their work environment through real-world examples.
Christine Ray
CISO at Unqork

Hundreds of high-quality videos that are relatable and retainable — with a dash of humor

Video thumbnail Chain mail
Chain mail

It’s highly unlikely that chain mail contains relevant information. If you forward it, you’re just wasting everyone’s time.

Video thumbnail Password managers
Password managers

We will always need passwords but remembering them can be difficult.

Video thumbnail Personal information
Personal information

If a customer asks you to forget about them, you must comply.

Video thumbnail Phishing
Phishing

8 million people are each day opening phishing e-mails, and this is the source of most cyberattacks.

Video thumbnail Pop ups
Pop-ups

Do you know the proper way to shut down pop-ups?

Video thumbnail Software installations
Software installations

Make your IT technician’s job easier and don’t install software on your work computer without permission.

Video thumbnail Think Before You Click Phishing
Think before you click – phishing

One of the most valuable cybersecurity knowledge to have is how to spot phishing emails easily and avoid giving away private password and credentials.

Video thumbnail Unknown networks
Unknown networks

Hackers can set up a WiFi access point, and if you connect to it, much of your communication can be monitored or even manipulated.

Video thumbnail VPN – Working from home
VPN – Working from home

A VPN connection creates a virtual tunnel between your laptop or smart device and your office servers.

Video thumbnail Personal USB drives
Personal USB drives

Your home computer is not as well protected as your work computer.

Video thumbnail Online shopping risk
Online shopping risk

The biggest risk when shopping online is not that you could simply lose your money.

Video thumbnail Let the right one in
Let the right one in

Make sure that only employees have access to the workplace, both during and outside working hours.

Video thumbnail Working from home – Insider threat
Working from home – Insider threat

“Insider threat” usually refers to employees who leak data, but data can also leak out because of their friends.

Video thumbnail Working from home – Unattended computer
Working from home – Unattended computer

Keep your computer safe and locked when working from home.

Video thumbnail Social media sharing
Social media sharing

Be careful what you share on social media.

Video thumbnail Spyware in attachments
Spyware in attachments

When it comes to distributing viruses, spyware, or other malware, there is no method more popular among hackers than attachments.

Video thumbnail Spreading viruses
Spreading Viruses

If you install unapproved software on your work computer, the whole office network could become infected with a virus.

Video thumbnail Tailgating II
Tailgating II

All workplaces should have strong policies and procedures in place when it comes to letting strangers into restricted areas.

Video thumbnail Home WiFi II
Home WiFi II

Always make sure your home WiFi is secure and encrypted.

Video thumbnail Double check before you trust
Double-check before you trust II

Be aware that there is always a possibility that someone has been “listening in” on your email conversations.

Video thumbnail Insider threat
Insider threat

Sometimes security breaches are performed by employees, willingly or accidentally.

Video thumbnail Security culture
Security culture

Creating and maintaining a good security culture in the workplace is something that all businesses should strive for.

Video thumbnail Zoom Bombing
Zoom bombing

With great new technologies come great new threats.

Video thumbnail Ransomware attack
Ransomware attack

Accepting software updates or downloads from a website is risky business.

Video thumbnail Microsoft Office risk
Microsoft Office risk

Do not enable editing on Office documents unless you’re absolutely sure.

Video thumbnail Conference risk
Conference risk

Beware of free portable memory drives and charging banks.

Video thumbnail Physical media
Physical media

It’s easier to steal physical data than hacking into databases or guessing passwords.

Video thumbnail Phishing urgency
Phishing Urgency

A tone of urgency in an email is one of the key indicators of a phishing email.

Video thumbnail Juice jacking
Juice Jacking

Always charge your devices using your own charger and cable.

Video thumbnail Keep it safe
Keep it safe

Can your clients trust you with their information? Do you guard it like it is your own?

Video thumbnail Security awareness training
Security Awareness Training

When we know about the dangers all around us, we can take precautions and try to navigate our world more safely.

Video thumbnail Stakeout
Stakeout

Always be aware of your surroundings.

Video thumbnail Online PDF makers
Online pdf makers

Don’t choose convenience over security.

Video thumbnail Passphrases
Passphrases

Forget complex passwords … oh wait, we already did!

Video thumbnail Update your software
Update Your Software

Patching your software whenever you get notified of an available update could save you a lot of trouble and time in the long run.

Video thumbnail Multi factor authentication
Multifactor Authentication

Hackers have been after passwords since the dawn of the Internet and they are surprisingly adept at stealing them and even guessing them.

Video thumbnail Valuables in the car
Valuables in car

If you are trusted with confidential information on electronic media or printouts, leaving them in an unsupervised car is not safe.

Video thumbnail Check the account number
Check Account Number

Fraudsters might try to sneak a bogus invoice into your accounting department. You should always double-check new account numbers.

Video thumbnail Network printers
Network printers

The main risk factor when using a networked printer is that if you select the wrong printer, confidential material can reach unauthorized eyes, inside or outside the workplace.

Video thumbnail Autofill
Auto-fill

Sometimes confidential information leaks out because email senders are in a hurry or distracted and select the wrong recipient.

Video thumbnail Mobile listening
Mobile listening

Beware! Malware could be installed on your smartphone that turns on your camera and microphone to listen in on your conversations.

Video thumbnail Sharing information
Sharing information

Be extra careful about who you deliver confidential information to, and make sure the recipient has the authority to access it.

Video thumbnail Unnecessary data
Unnecessary Data

Read up on the privacy laws you need to follow in your day-to-day work. Failure to comply might result in fines for your workplace.

Video thumbnail Correct links
Correct Links

Hover over links in emails before you click on them to make sure they’ll lead you to the right place.

Video thumbnail Think before you post
Think Before You Post (US)

Think twice before you post or comment on your social media sites. How will this reflect on you or your workplace?

Video thumbnail Privacy screens
Privacy Screens

Using a privacy screen, or privacy filter, is an affordable way to increase your security when working outside the office.

Video thumbnail Unattended computer
Unattended Computers

Leaving your computer unlocked and unattended can cause serious problems if someone else has access to it.

Video thumbnail Same password
Same Password

Managing multiple passwords can be hard, but here’s why you shouldn’t use the same password for every account.

Video thumbnail Vishing
Vishing

When a person calls you on the phone and uses a false reason or claim to trick you into handing over personal or sensitive information, such as your social security number or credit card information, that’s called Vishing.

Video thumbnail Phone locking
Phone Locking

Documents, memos, emails, and contacts can be stolen if you leave your phone unlocked.

Video thumbnail Ransomware
Ransomware

You can infect your computer with ransomware by various means, like opening an attachment or updating your computer from an untrustworthy source. It can be very expensive to recover your files.

Video thumbnail Data leaks
Data Leaks

A data leak is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

Video thumbnail Keylogger
Keylogger

Check your computer ports regularly for unknown devices.

Video thumbnail CEO scam
CEO Scam

Always double-check unusual requests from your boss, especially regarding financial transfers.

Video thumbnail Dumpster diving
Dumpster Diving

A lot of valuable information could be gathered by going through your workplace’s trash.

Video thumbnail Social engineering
Social Engineering

Don’t share confidential information with people who do not have authorisation. Not even your best friends.

Video thumbnail Home WiFi
Home WiFi

If you’re working from home, make sure your home WiFi is secure and encrypted.

Video thumbnail USB key drop
USB Key Drop

What should you do when you find a USB flash drive? Whatever you do, don’t plug it into your computer.

Video thumbnail Shoulder surfing
Shoulder Surfing

Cyber criminals don’t just guess or hack your password. Sometimes they simply watch you type it in.

Video thumbnail Handling confidential material
Handling Confidential Material

Your personal email and online storage are usually not a safe as your work email.

Video thumbnail Spyware
Spyware

How does spyware get onto your computer? Here’s one way.

Video thumbnail Malicious attachments
Malicious Attachments

All mail is not necessarily good mail. Don’t open attachments or links from unknown senders.

Video thumbnail Printouts
Printouts

When printing, remember to dispose of your documents properly.

Video thumbnail Free WiFi
Free WiFi

It’s easy for hackers to monitor what other people are doing when they’re connected to the same free WiFi.

Video thumbnail Password handling
Password Handling

It’s hard to juggle multiple passwords, but writing them down and storing them by your computer is what hackers are hoping for.

Video thumbnail Removable media
Removable Media

There is a risk to using removable media. Make sure to encrypt your documents in case your flash drive gets lost or stolen.

Video thumbnail Passwords
Passwords

To create a strong password, it’s best to use a combination of lower case and upper case letters, symbols, and numbers.

Video thumbnail Clean desk
Clean Desk

Our desks are not a safe place for confidential documents.

Video thumbnail Think twice
Think Twice

Inter-office emails can be fun, but we still need to remember proper email etiquette.

Video thumbnail Tailgating
Tailgating

Hackers rely on the kindness of strangers to gain access to restricted areas.

Video thumbnail HTTPS
HTTPS

A website address starting with HTTPS is encrypted and much safer than a website address starting with HTTP.

Video thumbnail Spear phishing
Spear Phishing

Knowing about someone’s interests and hobbies is valuable and helps hackers create spear phishing emails specifically designed for that person.

Video thumbnail Chain mail
Chain mail

It’s highly unlikely that chain mail contains relevant information. If you forward it, you’re just wasting everyone’s time.

Video thumbnail Password managers
Password managers

We will always need passwords but remembering them can be difficult.

Video thumbnail Personal information
Personal information

If a customer asks you to forget about them, you must comply.

Video thumbnail Phishing
Phishing

8 million people are each day opening phishing e-mails, and this is the source of most cyberattacks.

Video thumbnail Pop ups
Pop-ups

Do you know the proper way to shut down pop-ups?

Video thumbnail Software installations
Software installations

Make your IT technician’s job easier and don’t install software on your work computer without permission.

Video thumbnail Think Before You Click Phishing
Think before you click – phishing

One of the most valuable cybersecurity knowledge to have is how to spot phishing emails easily and avoid giving away private password and credentials.

Video thumbnail Unknown networks
Unknown networks

Hackers can set up a WiFi access point, and if you connect to it, much of your communication can be monitored or even manipulated.

Video thumbnail VPN – Working from home
VPN – Working from home

A VPN connection creates a virtual tunnel between your laptop or smart device and your office servers.

Video thumbnail Personal USB drives
Personal USB drives

Your home computer is not as well protected as your work computer.

Video thumbnail Online shopping risk
Online shopping risk

The biggest risk when shopping online is not that you could simply lose your money.

Video thumbnail Let the right one in
Let the right one in

Make sure that only employees have access to the workplace, both during and outside working hours.

Video thumbnail Working from home – Insider threat
Working from home – Insider threat

“Insider threat” usually refers to employees who leak data, but data can also leak out because of their friends.

Video thumbnail Working from home – Unattended computer
Working from home – Unattended computer

Keep your computer safe and locked when working from home.

Video thumbnail Social media sharing
Social media sharing

Be careful what you share on social media.

Video thumbnail Spyware in attachments
Spyware in attachments

When it comes to distributing viruses, spyware, or other malware, there is no method more popular among hackers than attachments.

Video thumbnail Spreading viruses
Spreading Viruses

If you install unapproved software on your work computer, the whole office network could become infected with a virus.

Video thumbnail Tailgating II
Tailgating II

All workplaces should have strong policies and procedures in place when it comes to letting strangers into restricted areas.

Video thumbnail Home WiFi II
Home WiFi II

Always make sure your home WiFi is secure and encrypted.

Video thumbnail Double check before you trust
Double-check before you trust II

Be aware that there is always a possibility that someone has been “listening in” on your email conversations.

Video thumbnail Insider threat
Insider threat

Sometimes security breaches are performed by employees, willingly or accidentally.

Video thumbnail Security culture
Security culture

Creating and maintaining a good security culture in the workplace is something that all businesses should strive for.

Video thumbnail Zoom Bombing
Zoom bombing

With great new technologies come great new threats.

Video thumbnail Ransomware attack
Ransomware attack

Accepting software updates or downloads from a website is risky business.

Video thumbnail Microsoft Office risk
Microsoft Office risk

Do not enable editing on Office documents unless you’re absolutely sure.

Video thumbnail Conference risk
Conference risk

Beware of free portable memory drives and charging banks.

Video thumbnail Physical media
Physical media

It’s easier to steal physical data than hacking into databases or guessing passwords.

Video thumbnail Phishing urgency
Phishing Urgency

A tone of urgency in an email is one of the key indicators of a phishing email.

Video thumbnail Juice jacking
Juice Jacking

Always charge your devices using your own charger and cable.

Video thumbnail Keep it safe
Keep it safe

Can your clients trust you with their information? Do you guard it like it is your own?

Video thumbnail Security awareness training
Security Awareness Training

When we know about the dangers all around us, we can take precautions and try to navigate our world more safely.

Video thumbnail Stakeout
Stakeout

Always be aware of your surroundings.

Video thumbnail Online PDF makers
Online pdf makers

Don’t choose convenience over security.

Video thumbnail Passphrases
Passphrases

Forget complex passwords … oh wait, we already did!

Video thumbnail Update your software
Update Your Software

Patching your software whenever you get notified of an available update could save you a lot of trouble and time in the long run.

Video thumbnail Multi factor authentication
Multifactor Authentication

Hackers have been after passwords since the dawn of the Internet and they are surprisingly adept at stealing them and even guessing them.

Video thumbnail Valuables in the car
Valuables in car

If you are trusted with confidential information on electronic media or printouts, leaving them in an unsupervised car is not safe.

Video thumbnail Check the account number
Check Account Number

Fraudsters might try to sneak a bogus invoice into your accounting department. You should always double-check new account numbers.

Video thumbnail Network printers
Network printers

The main risk factor when using a networked printer is that if you select the wrong printer, confidential material can reach unauthorized eyes, inside or outside the workplace.

Video thumbnail Autofill
Auto-fill

Sometimes confidential information leaks out because email senders are in a hurry or distracted and select the wrong recipient.

Video thumbnail Mobile listening
Mobile listening

Beware! Malware could be installed on your smartphone that turns on your camera and microphone to listen in on your conversations.

Video thumbnail Sharing information
Sharing information

Be extra careful about who you deliver confidential information to, and make sure the recipient has the authority to access it.

Video thumbnail Unnecessary data
Unnecessary Data

Read up on the privacy laws you need to follow in your day-to-day work. Failure to comply might result in fines for your workplace.

Video thumbnail Correct links
Correct Links

Hover over links in emails before you click on them to make sure they’ll lead you to the right place.

Video thumbnail Think before you post
Think Before You Post (US)

Think twice before you post or comment on your social media sites. How will this reflect on you or your workplace?

Video thumbnail Privacy screens
Privacy Screens

Using a privacy screen, or privacy filter, is an affordable way to increase your security when working outside the office.

Video thumbnail Unattended computer
Unattended Computers

Leaving your computer unlocked and unattended can cause serious problems if someone else has access to it.

Video thumbnail Same password
Same Password

Managing multiple passwords can be hard, but here’s why you shouldn’t use the same password for every account.

Video thumbnail Vishing
Vishing

When a person calls you on the phone and uses a false reason or claim to trick you into handing over personal or sensitive information, such as your social security number or credit card information, that’s called Vishing.

Video thumbnail Phone locking
Phone Locking

Documents, memos, emails, and contacts can be stolen if you leave your phone unlocked.

Video thumbnail Ransomware
Ransomware

You can infect your computer with ransomware by various means, like opening an attachment or updating your computer from an untrustworthy source. It can be very expensive to recover your files.

Video thumbnail Data leaks
Data Leaks

A data leak is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

Video thumbnail Keylogger
Keylogger

Check your computer ports regularly for unknown devices.

Video thumbnail CEO scam
CEO Scam

Always double-check unusual requests from your boss, especially regarding financial transfers.

Video thumbnail Dumpster diving
Dumpster Diving

A lot of valuable information could be gathered by going through your workplace’s trash.

Video thumbnail Social engineering
Social Engineering

Don’t share confidential information with people who do not have authorisation. Not even your best friends.

Video thumbnail Home WiFi
Home WiFi

If you’re working from home, make sure your home WiFi is secure and encrypted.

Video thumbnail USB key drop
USB Key Drop

What should you do when you find a USB flash drive? Whatever you do, don’t plug it into your computer.

Video thumbnail Shoulder surfing
Shoulder Surfing

Cyber criminals don’t just guess or hack your password. Sometimes they simply watch you type it in.

Video thumbnail Handling confidential material
Handling Confidential Material

Your personal email and online storage are usually not a safe as your work email.

Video thumbnail Spyware
Spyware

How does spyware get onto your computer? Here’s one way.

Video thumbnail Malicious attachments
Malicious Attachments

All mail is not necessarily good mail. Don’t open attachments or links from unknown senders.

Video thumbnail Printouts
Printouts

When printing, remember to dispose of your documents properly.

Video thumbnail Free WiFi
Free WiFi

It’s easy for hackers to monitor what other people are doing when they’re connected to the same free WiFi.

Video thumbnail Password handling
Password Handling

It’s hard to juggle multiple passwords, but writing them down and storing them by your computer is what hackers are hoping for.

Video thumbnail Removable media
Removable Media

There is a risk to using removable media. Make sure to encrypt your documents in case your flash drive gets lost or stolen.

Video thumbnail Passwords
Passwords

To create a strong password, it’s best to use a combination of lower case and upper case letters, symbols, and numbers.

Video thumbnail Clean desk
Clean Desk

Our desks are not a safe place for confidential documents.

Video thumbnail Think twice
Think Twice

Inter-office emails can be fun, but we still need to remember proper email etiquette.

Video thumbnail Tailgating
Tailgating

Hackers rely on the kindness of strangers to gain access to restricted areas.

Video thumbnail HTTPS
HTTPS

A website address starting with HTTPS is encrypted and much safer than a website address starting with HTTP.

Video thumbnail Spear phishing
Spear Phishing

Knowing about someone’s interests and hobbies is valuable and helps hackers create spear phishing emails specifically designed for that person.

Crafted in a combined effort by film-makers, behavioral and cybersecurity experts

If people doze off during the training, they aren’t learning. AwareGO videos are fun, engaging and highly relatable

Relatable content makes it easy for the employees to apply learnings in their daily work

Compliance is easy if the training is fun, engaging and short — so it doesn’t hurt employee productivity

in trouble

Increase engagement and awareness with digital nudges

Every video lesson comes with a 1-question quiz to reinforce the learning moment.

Our “good habit” posters, stickers and newsletters can be shared through digital communication channels. But also printed out and placed in offices.

Slice and dice the content from our reinforcement materials so it fits your cybersecurity plans and tone of voice.

SAV Nudges 2

When you need help with stakeholders buy-in

160 cybersecurity leaders in our panel share their opinions, techniques and experiences with us. Learn from them

Our introductory content helps you build the case for stakeholders what we need security awareness

Product and methodology overviews that give insights into our approach to cybsersecurity awareness

SAV Buyin

Deliver through our cloud platform or SCORM

If you already have an existing delivery solution in place, easily integrate our content with code snippets or the SCORM 1.2 and SCORM 2004 3rd edition standards

SAV Deliver

Train people in their native language

Our content is localized with voice-overs by professional actors and native speakers. It’s accessible with captions and available in 18+ languages

content

P.S.

99+ videos

Cover the full spectrum of cybersecurity awareness

60 sec. long

Short story-driven videos that don’t bore or hurt productivity

With quizzes

Each video has a quiz to reinforce learning

Add additional materials

Add company-specific instructions, links to relevant resources, etc.

Posters

Make cybersecurity top-of-mind in your physical spaces

Fits your brand

Add your company branding, telops or short messaging

Regular updates

We release new videos regularly to cover emerging threats

In your language

Available in 18 languages with more being added

Award-winning content

Two times 2022 Bronze Telly Award Winner

Beyond content

Explore how to deliver targeted training and how to track human cybersecurity resilience in your company

menu measure

Human Risk Assessment

Measure employees’ cybersecurity knowledge and behavior before and after training

Learn more →
menu train

Security Awareness Training

Achieve compliance and build security culture with curated behavior-changing training programs

Learn more →

FAQ

How many videos do you have?

We have more than 80 training lessons in 18 languages. We release new videos monthly to cover emerging threats.

How many assessment scenarios do you have?

We have more than 40 assessment scenarios in 18 languages. We release new scenarios regularly to cover emerging threats.

How many languages do you support?

Our training and assessment content is available in 18 languages with more being added.

Do you offer integrations?

Yes. We integrate with common workplace tools like Slack and Teams. We also provide a robust API.

How can I manage employees?

Easily! Manage users by integrating with Active Directory, Google Workspace, or your SSO solution.

What is the format of your content?

Our content is available through our proprietary LMS but we also have the entire content library available as SCORM.

Does your training and assessment work on mobile?

Yes! Our platform and videos have been created with mobile generation in mind. So employees can do their training on the go.

What happens if I exceed the user count?

If you exceed the maximum number of users allowed in your plan, we’ll adjust your fee from that day.

Do I have to pay for content updates?

Free content updates are available for Standard plan every 6 months and for Complete plan every 1 month.

How to get started

You and your employees are going to love AwareGO. It’s a modern, cloud-based system for managing human risk, from assessment to remediation. We’ve made it super easy — schedule your first assessment or training in minutes.

Get started for free and give it a go right now.

You’ll love the way AwareGO can fit into your existing infrastructure. Our robust APIs, widgets, and content available in SCORM format make sure that the integration is seamless. We also integrate with Active Directory, Google Workspace, and popular tools like Slack and Teams.

Contact us and our experts will recommend the best way to integrate.

Upgrade your cybersecurity business by adding human risk management to your existing portfolio of services. Increase your deal size by leveraging Human Risk Assessment or offering Security Awareness Training to your current customers and creating a new revenue stream.

Contact us to become an AwareGO partner, and we will support you every step of the way.

Join top companies worldwide in the mission to make workplaces cyber-safe

Get started free
blank blank blank blank blank blank blank blank blank blank

Stay on top of cybersecurity threats

blank
How to Offer Award-Winning Cybersecurity Training Without Building a Thing

If you’re an MSP, MSSP, consultant, training provider, or LMS vendor, you’ve likely heard this from clients: “Our cybersecurity training is boring.” “...

blank
Moving beyond "Who clicked the link"

Phishing simulations are outdated, and here is what works better in 2025 For years, phishing simulations have been the go-to tool to “train” or more l...

blank
Train Less, Save More

Train Less, Save More: How AwareGO Reduces Cybersecurity Training Costs and Compliance Stress in 2025 Let’s face it, keeping employees cyber-safe in 2...

blank
Holiday Cybersecurity: Keep the Season Joyful and Hack-Free!

The holidays are a time for celebration, connection, and spreading joy—but they’re also a peak season for cybercriminals. From phishing scams to fake...

blank
7 Ways to Create Gamified Cybersecurity Training That Engages Employees in 2024

Gamified cybersecurity training remains a powerful tool to engage employees and reinforce crucial security practices. With evolving threats and techno...

blank
Unlocking Enhanced Cybersecurity with AwareGO and Vanta

In today’s rapidly evolving digital landscape, maintaining robust cybersecurity measures is more critical than ever. Companies need comprehensive solu...

blank
Phishing Cybersecurity: 5 Unexpected Human Behaviors Unmasked

We found unexpected behaviors that employees exhibit when faced with phishing cybersecurity scenarios. Take a look.

blank
Elevate Your Cybersecurity: Introducing AwareGO's Managed Cybersecurity Services 

Human Risk Management and mitigation can be a time-consuming endeavor, often sidelined due to a lack of manpower. Organizations struggle to keep up wi...

blank
Ending the Guessing Game in Cybersecurity with Smart Training Recommendations

AwareGO's Training Recommendation feature is a game-changer in the field of cybersecurity. It empowers organizations to transform their cybersecurity...

blank
The Human Element: A Crucial Aspect of Cyber Risk Assessment Services and 8 Ways to Address It

Cyber threats continue to grow in sophistication and frequency, making it crucial for businesses to take proactive measures to protect their sensitive...