Our Catalog

Our catalog of training subjects

We provide training materials in the form of short and inspiring security awareness videos that help you inform your employees of possible dangers.

Our content is ready to deploy on your intranet or internal learning software. For small and medium sized businesses we also provide a simple, hosted learning platform enabling you to be up and running in a matter of minutes.

All our content is currently available in English and German and easily made available in other languages. Please contact us regarding your language needs: awarego@awarego.com

Want to see more?

If you would like to see all our videos, write your business email below and we will send you a link to all our videos..

Mobile listening

You should be aware that there might be a malware installed on your mobile where they can turn on your camera and microphone to listen in on your conversation.

Unknown network

It is very easy for a hacker to set up a Wi-Fi access point, but if you connect, much of your communication can be monitored or even manipulated.

Unnecessary Data

Processing of personal data is only allowed under very strict circumstances, described in Article 9 of the GDPR.

Sharing information

If you must deliver confidential information to another person or entity, be extra careful who you deliver it to and if the recipient has the authority to access the information.

Doublecheck before you trust

Beware that there is always a possibility that someone has been “listening in” on your email conversations, jumping in when you least suspect it and fooling you into doing something you should not do.

Correct Links

Sometimes when you receive links that look authentic, there can be a minor error that can be easy to miss to trick you into clicking and visit sites that can be dangerous.

Think Before You Post

Some platforms and websites post more information about you than others, like for example your workplace. Commenting or posting in a hurtful way might damage the reputation of your workplace and distress your fellow coworkers.

Privacy Screens

Using a privacy screen is a very affordable way to increase your security dramatically when working outside of your office. They are in fact a polarized film that goes on top of your monitor and limits the brightness that goes through, except from a certain angle, making it hard to view for bystanders.

Same Passwords

Managing multiple passwords can be hard.

Unattended Computer

Leaving your computer unlocked and unattended can cause serious problems if someone else has access to it.


You can infect your computer with ransomware by various means, like opening an attachment or updating your computer from an untrustworthy source. It can be very expensive to recover your files.

Data Leaks

A data leak is the intentional or unintentional release of secure or private/confidential information to an untrusted environment. Failure to report a leak can have severe consequences for the individual and lead to hefty fines for the company.


Documents, memos, emails and contacts can be stolen if you leave your phone unlocked. It is important to guard your information. Always keep your phone locked when you’re not using it.


Vishing is the telephone equivalent of phishing. It is described as the act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.


"It‘s not just the equipment I‘m after. All of your secrets are now my secrets and all I had to do was smile."


Every day, 8 million people open a fraudulent phishing email. Don‘t add to that number.

Spear Phishing

Knowing about people’s interests and hobbies is valuable and that’s how they get you.


A website starting with HTTPS is encrypted and much safer.

Appropriate Emails

Think twice. This Bob doesn‘t like it when he receives your "funny“ emails.

Clean Desk

Sadly the person leaking confidential information often doesn‘t realise they're the source of the leak


To create a strong password it‘s best to use a combination of lowercase, uppercase letters, symbols and numbers.

Pop Ups

Oh Mary, don‘t just click on anything that pops up

Removable Media

You step away, you lose your keys, now someone else has your work.

Password Handling

"So many people take the convenient path of writing down their passwords and hiding them by their desks. That’s very convenient - especially for me.

Free WiFi

"Now I can buy whatever I want, using your money."


Dispose properly of your documents.

Malicious Attachments

All mail is not necessarily good mail.


Now the perpetrator can see everything you do on your computer, work related and personal.

Handling Confidential Material

Your personal email and online storage is often not a safe as your work email.

Shoulder Surfing

Check your surroundings while typing in your password.

USB Key Drop

A hidden program on an unknown USB drive might execute, giving a hacker complete control.

Home WiFi

Make sure your home WiFi is secure.

Software Installs

Let’s keep our work computers clean.

Social Engineering

The risk of sharing confidential information.

Chain Mail

Chances are that chain mail is not relevant information and you just wasted everyone’s time.

Dumpster Diving

Some people make money rummaging through your trash.

CEO Scam

Always double check unusual requests from your boss, especially regarding financial transfers.


Check your computer ports regularly for unknown devices.