monsters-background

Thanks for requesting your
Free Cybersecurity Awareness Month
Resource Kit

We hope these help you and your users defend against cybercrime!


Cybersecurity Awareness Month is a great time to educate yourself and your users.

Cyber threats can be scary, and for good reason. Malware can be lurking in a suspicious email your users get convinced to click. All it takes is one crack in the door of your network to let all the wrong ones in; spear phishing witches, ravenous ransomwolves, you name it!

But never fear! While torches, pitchforks and silver bullets never put down a data breach, a resilient security culture in your organization is your best bet for keeping the beasts at bay. We’ve put together a set of resources you can use throughout the entire month of October to help your users keep up their cybersecurity defenses. 

For you: our most popular security awareness on-demand webinar and whitepaper, resources for planning your training, and new templates to use in your campaigns. For your users: suggested training, infographics, new cyber-monster character cards and posters, plus new newsletters, security docs, and awareness tips that will help to keep them on their toes with security top of mind.

Resources for Planning Your Training:

Diamond Customer Guide

Cybersecurity Awareness Month Guide

This guide walks you through user resources included in your kit, suggestions for how to use them, and campaign ideas to get you started.

Download PDF >>


 

Diamond Customer Weekly Planner

Cybersecurity Awareness Weekly Planner

This training planner is packed with all of the great resources for users you see below. We put them into a weekly plan as an example for when to send each of the resources to your users.

View  >>

Resources For You

2023-Phishing-Industry-Benchmarking-Report-Webinar

Featured On-Demand Webinar: 2023 Phishing By Industry Benchmarking Report

The 2023 Phishing By Industry Benchmarking Report compiles results from the fifth annual study by KnowBe4 and reveals at-risk users across 19 industries that are susceptible to phishing or social engineering attacks. Taking it a step further, the research reveals radical drops in careless clicking after 90 days and 12 months of simulated phishing testing and security awareness training using the KnowBe4 platform.

Watch it Now >>

Building-an-Effective-and-Comprehensive-Security-Awareness-Program-Whitepaper

Featured Whitepaper: Building an Effective and Comprehensive Security Awareness Program

This paper will help break down the critical components of a successful security awareness program and connect them together into something comprehensive, continuous and engaging.

Read it Now >>

New Phishing Templates

NOTE: All resources below can be found by searching for the title in your admin console

UPS: We attempted to deliver your item

Scheduled Maintenance

LinkedIn: Hoyt Waller sent you a message on LinkedIn

Chase: Security Alert: Unusual Debit Card Activity Detected

New Landing Page Templates

How to avoid the Cyber Monsters

Browser Language Detecting: How to avoid the Cyber Monsters

That was scary!

Browser Language Detecting: That was scary!

Resources For Your Users

Video Modules

Kickoff Overview Cyberattacks

Featured Video Module: Kickoff: Overview Cyberattacks

What is ransomware – or phishing? And what does it have to do with my data? And my organization’s security? But above all: How can I protect myself? The “Overview Cyberattacks” video module provides an initial overview of the most widespread attack methods, raises awareness of data security, and shows that cybersecurity training sessions are an effective way to protect...data, employees, and the organization.

Security Snapshots Pretexting

Security Snapshots #19 - Pretexting

QR Codes Safe Scanning

QR Codes: Safe Scanning

SecurityCultureAndYou-Header

Security Culture & You

Interactive Training Modules

Introduction to Data Protection

Introduction to Data Protection

In this module, employees will learn what personal information is, about general privacy principles, the types of data that need protection, how to identify threats to data, and what happens when we fail to protect data. This module includes best practices that apply to most privacy regulations (such as GDPR, PIPEDA, CCPA, LGPD, POPIA, and others) and policies, and it uses definitions for privacy and personal information that are broadly applicable.

Beating Ransomware-2

Beating Ransomware

Social-Media-Fever-Course-Image

Cyber Heroes Series: Social Media Fever

Phish or Treat Game

Phish or Treat Game

New! Cyber-Monster Character Cards and Posters

 

Frankenphisher

 

Ransomwolf

 

Spoofy Steve

 

Count Hackula

 

Breachatrix Le Phish

Security Docs and Awareness Tips

These will show your users what to watch out for in emails as well as how to stay secure from home, the office, when traveling or wherever they may be.

You are a Target

You are a Target

Major Keys To Ransomware

Major Keys to Ransomware Protection

How to Spot a Deepfake

How to Spot a Deepfake

Data Breaches and You

Data Breaches and You

Spot the Phish

Spot the Phish

Protecting Data Across Borders

Protecting Data Across Borders

Deepfake

Deepfake

Do You Think Before You Click?

 Do You Think Before You Click?

Avoid Becoming a Social Engineering Victim Four Questions to Ask yourself

Avoid Becoming a Social Engineering Victim

Reality Byites-Ransomware Gangs

Reality Bytes: Ransomware Gangs

AI_Chatbot_TitleSquare

What Are AI Chatbots?

Click with Care

Click with Care

Get the latest about social engineering

Subscribe to CyberheistNews