Our Videos

Our current catalog

We provide training materials in the form of short and inspiring security awareness videos that help you inform your employees of possible dangers.

Our content is ready to deploy on your intranet or internal learning software. For small and medium sized businesses we also provide a simple, hosted learning platform enabling you to be up and running in a matter of minutes.

All our content is currently available in English and German and easily made available in other languages. Please contact us regarding your language needs: awarego@awarego.com

Think Before You Post

Some platforms and websites post more information about you than others, like for example your workplace. Commenting or posting in a hurtful way might damage the reputation of your workplace and distress your fellow coworkers.

Privacy Screens

Using a privacy screen is a very affordable way to increase your security dramatically when working outside of your office. They are in fact a polarized film that goes on top of your monitor and limits the brightness that goes through, except from a certain angle, making it hard to view for bystanders.

Same Passwords

Managing multiple passwords can be hard.

Unattended Computer

Leaving your computer unlocked and unattended can cause serious problems if someone else has access to it.

Ransomware

You can infect your computer with ransomware by various means, like opening an attachment or updating your computer from an untrustworthy source. It can be very expensive to recover your files.

Data Leaks

A data leak is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Failure to report a leak can have severe consequences for the individual and lead to hefty fines for the company.

Phonelocking

Documents, memos, emails and contacts can be stolen if you leave your phone unlocked. It is important to guard your information. Always keep your phone locked when you’re not using it.

Vishing

Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.

Tailgating

"It‘s not just the equipment I‘m after. All of your secrets are now my secrets and all I had to do was smile."

Phishing

Every day, 8 million people open a fraudulent phishing email. Don‘t add to that number.

Spear Phishing

Knowing about people’s interests and hobbies is valuable and that’s how they get you.

HTTPS

A website starting with HTTPS is encrypted and much safer.

Appropriate Emails

Think twice. This Bob doesn‘t like it when he receives your "funny“ emails.

Clean Desk

Sadly the person leaking confidential information often doesn‘t realise they're the source of the leak

Passwords

To create a strong password it‘s best to use a combination of lowercase, uppercase letters, symbols and numbers.

Pop Ups

Oh Mary, don‘t just click on anything that pops up

Removable Media

You step away, you lose your keys, now someone else has your work.

Password Handling

"So many people take the convenient path of writing down their passwords and hiding them by their desks. That’s very convenient - especially for me.

Free WiFi

"Now I can buy whatever I want, using your money."

Printouts

Dispose properly of your documents.

Malicious Attachments

All mail is not necessarily good mail.

Spyware

Now the perpetrator can see everything you do on your computer, work related and personal.

Handling Confidential Material

Your personal email and online storage is often not a safe as your work email.

Shoulder Surfing

Check your surroundings while typing in your password.

USB Key Drop

A hidden program on an unknown USB drive might execute, giving a hacker complete control.

Home WiFi

Make sure your home WiFi is secure.

Software Installs

Let’s keep our work computers clean.

Social Engineering

The risk of sharing confidential information.

Chain Mail

Chances are that chain mail is not relevant information and you just wasted everyone’s time.

Dumpster Diving

Some people make money rummaging through your trash.

CEO Scam

Always double check unusual requests from your boss, especially regarding financial transfers.

Keylogger

Check your computer ports regularly for unknown devices.