Our Catalog

Our catalog of training subjects

We provide training materials in the form of short and inspiring security awareness videos that help you inform your employees of possible dangers.

Our content is ready to deploy on your intranet or internal learning software. For small and medium sized businesses we also provide a simple, hosted learning platform enabling you to be up and running in a matter of minutes.

All our content is currently available in English, Danish and Icelandic, as well as with Chinese Mandarin and Polish subtitles, and can easily be made available in other languages. Please contact us regarding your language needs: awarego@awarego.com

Want to see more?

If you would like to see all our videos, write your business email below and we will send you a link to all our videos..

  • Must know
  • Office
  • Out of office
  • GDPR
  • Internet
  • Passwords

A website starting with HTTPS is encrypted and much safer.

Clean Desk

Sadly the person leaking confidential information often doesn‘t realise he‘s the source of the leak


To create a strong password it‘s best to use a combination of lowercase, uppercase letters, symbols and numbers

Pop ups

Oh Mary, don‘t just click on anything that pops up

Removable Media

You step away, you lose your keys, now someone else has your work

Free WiFi

Now I can buy whatever I want, using your money.


Dispose properly of your documents.


Now the perpetrator can see everything you do on your computer, work related and personal.

Handling Confidential Material

Your personal email and online storage is often not a safe as your work email.

Shoulder Surfing

Check your surroundings while typing in your password.

USB Key Drop

A hidden program on an unknown USB drive might execute giving a hacker complete control.

Home WiFi

Make sure your home WiFi is secure.

Software installs

Let’s keep our work computers clean.

Social Engineering

The risk of sharing confidential information.

Dumpster Diving

Some people make money rummaging through your trash.

Key logger

Check your computer ports regularly for unknown devices


You can infect your computer with ransomware by various means, like opening an attachment or updating your computer from an untrustworthy source and it can be very expensive to recover your files.


Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.


Document, memos, email and contacts can be stolen if you leave your phone unlocked. It is important to guard the information. Always keep your phone locked when you’re not using it.

Think before you post

Some platforms and websites post more information about you than others, like for example your workplace. Commenting or posting in a hurtful way might damage the reputation of your workplace and distress your fellow coworkers.

Privacy screens

Using a privacy screen is a very affordable way to increase your security dramatically when working outside of your office.

Correct Links

Sometimes when you receive links that look authentic, there can be a minor error that can be easy to miss to trick you into clicking and visit sites that can be dangerous.

Doublecheck Before You Trust

There is always a possibility that someone has been “listening in” on your email conversations, jumping in when you least suspect it and fooling you into doing something you should not do.

Sharing Information

If you must deliver confidential information to another person or entity, be extra careful who you deliver it to and if the recipient has the authority to access the information.

Unnecessary Data

Processing of personal data revealing sensitive information is only allowed under very strict circumstances, described in Article 9 of the GDPR.

Mobile listening

You should be aware that there might be a malware installed on your mobile where they can turn on your camera and microphone to listen in on your conversation.

Unknown network

It is very easy for a hacker to set up a Wi-Fi access point, but if you connect, much of your communication can be monitored or even manipulated.

Network printers

The main risk factor when using a networked printer is that if you select the wrong printer, confidential material can reach unauthorized eyes, inside or outside of the company.

Valuables in the car

Valuables in cars are not only your credit cards or wallets. If you are trusted with confidential information on medias or printouts, leaving them in an unsupervised car is not safe.

Payments available