Our Catalog

Our catalog of training subjects

We provide training materials in the form of short and inspiring security awareness videos that help you inform your employees of possible dangers.

Our content is ready to deploy on your intranet or internal learning software. For small and medium sized businesses we also provide a simple, hosted learning platform enabling you to be up and running in a matter of minutes.

All our content is currently available in English, Danish and Icelandic, as well as with Chinese Mandarin and Polish subtitles, and can easily be made available in other languages. Please contact us regarding your language needs: awarego@awarego.com

Want to see more?

If you would like to see all our videos, write your business email below and we will send you a link to all our videos..



  • Must know
  • Office
  • Out of office
  • GDPR
  • Internet
  • Passwords
blank
https

A website address starting with HTTPS is encrypted and much safer than a website address starting with HTTP.

blank
Clean desk

Our desks are not safe places for keeping confidential documents out in the open.

blank
Passwords

To create a strong password, it's best to use a combination of lower case, upper case letters, symbols and numbers

blank
Popups

Do you know the proper way to shut down pop-ups?

blank
Free Wii

It's easy for hackers to monitor what other people are doing when they're connected to the same free WiFi.

blank
Printouts

When printing, remember to dispose of your documents properly.

blank
Spyware

How does spyware get onto your computer? Here's one way.

blank
Shoulder surfing

Cyber criminals don't just guess or hack your password. Sometimes they simply watch you type it in.

blank
USB Key drop

What do you do when you find a USB flash drive? Whatever you do, don't plug it into your computer.

blank
Software Installs

Make your IT technician's job easier and don't install software on your work computer without permission.

blank
Social Engineering

Don't share confidential information with people who do not have authorisation. Not even your best friends.

blank
Dumpster diving

A lot of valuable information can be gathered by going through a company's rubbish bins.

blank
Keylogger

A reminder to check your computer ports regularly for unknown devices.

blank
Ransomware

You can infect your computer with ransomware by various means, like opening an attachment or updating your computer from an untrustworthy source. It can be very expensive to recover your files.

blank
Vishing

Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.

blank
Phonelocking

Documents, memos, e-mails and contacts can be stolen if you leave your phone unlocked.

blank
Think before you post

Some social media platforms and websites post more information about you than your name, for example where you work.

blank
Privacy Screens

Using a privacy screen is a very affordable way of dramatically increasing your security when working outside of your office.

blank
Correct links

Sometimes when you receive links that look authentic, there can be a minor error that can be easy to miss to trick you into clicking and visit sites that can be dangerous.

blank
Doublecheck before you trust

Be aware that there is always a possibility that someone has been “listening in” on your e-mail conversations.

blank
Unnecessary data

The processing of personal data revealing sensitive information is only allowed under very strict circumstances, described in Article 9 of the GDPR.

blank
Mobile listening

When discussing confidential material, you should be aware that there might be malware installed on your mobile where your camera and microphone can be turned on to listen in on your conversation.

blank
Unknown Networks

Hackers can set up a Wi-Fi access point and if you connect to it much of your communication can be monitored or even manipulated.

blank
Network printer

The main risk factor when using a networked printer is that if you select the wrong printer, confidential material can reach unauthorised eyes, inside or outside the company.

blank
Multi factor authentication

Hackers have been after passwords since the dawn of the Internet and they are surprisingly adept at stealing them and even guessing them.

blank
Spreading Viruses (Holiday Edition)

If you install unapproved software on a company computer, the whole network could become infected with a virus.

blank
GDPR Personal Information

If a customer asks you to forget about them, you must comply.

blank
Tailgating II

Companies need to have strong policies and procedures in place when it comes to letting strangers into sensitive areas.

blank
Stakeout

Always be aware of your surroundings.

blank
Passphrases

Forget complex passwords … oh wait, we already did!

blank
Online pdf makers

Don’t choose convenience over security.

blank
Password Manager

We will always need passwords but remembering them can be difficult.

Payments available