Our Videos

Our current catalog

We provide training materials in the form of short and inspiring security awareness videos that help you inform your employees of possible dangers.

Our simple solution is simple and ready to deploy on your intranet or internal learning software.

All our content is available in multiple languages. If you are interested in any other language. Please let us know at awarego@awarego.com


You can infect your computer with ransomware by various means, like opening an attachment or updating your computer from an untrustworthy source and it can be very expensive to recover your files.

Data leaks

A data leak is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Failure to report a leak can have severe consequences for the individual and lead to hefty fines for the ompany.


Document, memos, email and contacts can be stolen if you leave your phone unlocked. It is important to guard the information. Always keep your phone locked when you’re not using it.


Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.


It‘s not just the equipment I‘m after, all of your secrets are now my secrets and all I had to do was smile.


Every day 8 million people open a fraudulent phishing email, don‘t add to that number.


A website starting with HTTPS is encrypted and much safer.

Spear Phishing

Knowing about people’s interests and hobbies, knowing about these interests is valuable and that’s how they get you.

Think Twice

This Bob doesn‘t like it when he receives your „funny“ emails.

Clean Desk

Sadly the person leaking confidential information often doesn‘t realise he‘s the source of the leak


To create a strong password it‘s best to use a combination of lowercase, uppercase letters, symbols and numbers

Pop Ups

Oh Mary, don‘t just click on anything that pops up

Removable Media

You step away, you lose your keys, now someone else has your work

Password Handling

So many people take the convenient path of writing down their passwords and hiding them by their desks, that’s very convenient, especially for me.

Free WiFi

Now I can buy whatever I want, using your money.


Dispose properly of your documents.

Malicious Attachments

All mail is not necessarily good mail


Now the perpetrator can see everything you do on your computer, work related and personal.

Handling Confidential Material

Your personal email and online storage is often not a safe as your work email.

Shoulder Surfing

Check your surroundings while typing in your password.

USB Key Drop

A hidden program on an unknown USB drive might execute giving a hacker complete control.

Home WiFi

Make sure your home WiFi is secure.

Software Installs

Let’s keep our work computers clean.

Social Engineering

The risk of sharing confidential information.

Chain Mail

Chances are that chain mail is not relevant information and you just wasted everyone’s time.

Dumpster Diving

Some people make money rummaging through your trash.

CEO Scam

Always double check unusual requests from your boss, especially regarding financial transfers.


Check your computer ports regularly for unknown devices.