Welcome to Your Free
Cybersecurity
Awareness Month Resource Kit

We hope these assets help you and your users defeat whatever cyber villains you may come across!

In the never-ending battle against cyber villains, your users are on the front lines.

Only the most-experienced and well-equipped can stand up against the threats lurking behind every corner of cyberspace.

It’s dangerous out there, so you shouldn’t go alone. Take your users on an 8-bit journey across four levels of cyber sleuthing with our 80s arcade themed Cybersecurity Awareness Month resource kit! We’ve set you up with enough training content to run a whole themed campaign throughout October.

This year, each themed week represents a new level for your users to explore. Along the way they’ll encounter baddies bursting out of the arcade cabinet representing the key cyber threats for each week.

Pack your gear, plan your strategy and let the game begin!

The Tutorial Level: Making the Most of the Content

Cybersecurity Awareness
Month Strategy Guide

This guide walks you through user resources included in your kit, suggestions for how to use them and campaign ideas to get you started.

Cybersecurity Awareness
Weekly Planner

This interactive training planner is packed with all of the great resources for users you see below. We put them into a weekly plan as an example for when to send each of the resources to your users.
Week 1
title-level1
General Cybersecurity
The most basic and prevalent cyberthreats are no excuse for your users to keep their guard down. The goal of the first week is an introductory level to a variety of common cyberthreats that continue to take a toll on organizations of all sizes
Double-Trouble-Trivia-Social-Engineering-Game-Thumbnail

Interactive Game - Double Trouble Trivia: Social Engineering Game

Double-Trouble-Trivia-Social-Engineering-Game-Thumbnail

In this interactive trivia game, users learn all about social engineering and phishing in a Jeopardy-style quiz format. Users compete against a computer-controlled component; the most points wins!

Your employees will learn:
The damage caused by social engineering The damage caused by social engineering
Common attack methods Common attack methods
Tactics scammers use to gain access to systems and devices Tactics scammers use to gain access to systems and devices
We’ve provided you with a full suite of assets for Week 1.
Power-Ups Included:
Defining Human Firewall
Defining Human Firewall
Video Module
Power Up Your Password Security
Power Up Your Password Security
Infographic
Power Up Your Password Security
Power Up Your Password Security
Poster
The Human Firewall Manifesto
The Human Firewall Manifesto
Poster
Week 2
title-level2
AI Threats
Few threats have rocketed to the top of the infosec world’s worry list like AI-powered phishing emails, scams and deepfakes. The goal of the second level and the associated focus content is to ensure your users are well-versed in these threats both as they go about their work life and explore the internet in their down time.
New-Tools-Artificial-Intelligence-Scams-Thumbnail

Interactive Training Module - New Tools: Artificial Intelligence Scams

New-Tools-Artificial-Intelligence-Scams-Thumbnail

This 10-minute module uses video and realistic scenarios to teach learners at all career levels about the dangers of AI scams. Users will also take a short quiz to reinforce what they’ve learned.

Your employees will learn:
What new scam possibilities the rise of AI technology brings What new scam possibilities the rise of AI technology brings
How to look out for AI-based scams and what to do about them How to look out for AI-based scams and what to do about them
We’ve provided you with a full suite of assets for Week 2.
Power-Ups Included:
Generative AI: Seeing Through the Deception
Generative AI: Seeing Through the Deception
Video Module
Using Artificial Intelligence Safely and Securely
Using Artificial Intelligence Safely and Securely
Infographic
AI and Cybercrime
AI and Cybercrime
Poster
Artificial Intelligence, Security, and You
Artificial Intelligence, Security, and You
Security Doc
Week 3
title-level3
RANSOMWARE
A threat cybercriminals keep shelling out the coin for, ransomware threatens all corners of the cyberworld. Help your users navigate the third level of Cybersecurity Awareness Month with the equipment and know-how they’ll need to be ransomware-ready.
Ransomware-Blackmail-Using-Encrypted-Data

Interactive Training Module - Ransomware: Blackmail Using Encrypted Data

Ransomware-Blackmail-Using-Encrypted-Data

In this seven-minute module, employees will learn what to do in case of an malware-related emergency and what options are available to protect themselves against a ransomware attack and its consequences. Users will also take a short quiz at the end.

Your employees will learn:
The most common methods of ransomware attack The most common methods of ransomware attack
What to do in case of a ransomware emergency What to do in case of a ransomware emergency
How to prevent a ransomware infection How to prevent a ransomware infection
We’ve provided you with a full suite of assets for Week 3.
Power-Ups Included:
Security Snapshots - “Hungry” (Ransomware)
Security Snapshots - “Hungry” (Ransomware)
Video Module
Criminal Minds - Ransomware
Criminal Minds - Ransomware
Infographic
Jaws: Don’t Be a Victim
Jaws: Don’t Be a Victim
Poster
Ransomware Basics
Ransomware Basics
Security Doc
Week 4
level4-title
INCIDENT REPORTING
Combining all your users have learned throughout the week, the fourth and final level is all about making sure they know what to do when they see something. From reporting phishing emails to seeking help from IT, sharing when something seems not right is one of the most important steps in helping to keep our/your organization cybersecure.
Join-Security-Team-Thumbnail

Mobile-First Training Module - Join the Security Team

Join-Security-Team-Thumbnail

This four-minute module, designed for use on a mobile device, teaches how security incidents impact your entire organization and how every employee has a role to play in managing risk.

Your employees will learn:
Misconceptions about data security Misconceptions about data security
Common causes of security incidents Common causes of security incidents
How to make security-conscious decisions How to make security-conscious decisions
We’ve provided you with a full suite of assets for Week 4.
Power-Ups Included:
Incident Response: First Steps
Incident Response: First Steps
Video Module
Types of Incidents to Report
Types of Incidents to Report
Infographic
Incident Response
Incident Response
Poster
Following Policy and Reporting Incidents
Following Policy and Reporting Incidents
Security Doc
Bonus Level
Resources for You

FAIK Everything: The Deepfake Playbook, Unleashed

Watch this heart-stopping webinar where Perry Carpenter, KnowBe4's Chief Human Risk Management Strategist, rips the mask off the alarming rise of AI-powered social engineering. Whether you're a security leader, red teamer, risk manager, or anyone responsible for keeping your organization safe in this brave new world, this session is your ticket to staying ahead of the curve.

7 Best Practices For Implementing Human Risk Management

Read this guide to explore seven key ways to create an HRM plan that reduces cyber risks by changing employee behavior and building a stronger security mindset.

NOTE: All resources below can be found by searching for the title in your admin console

Phishing Templates
  • Password Alert (Link) (Spoofs Domain)
  • ChatGPT: Your Custom ChatGPT AI Portal is Now Live (Link)
  • Ransomware Scan (Link) (Spoofs Domain)
  • Microsoft 365: Your incident has been opened (Link)
New Landing Pages Templates

Could This Be Game Over? (Browser-language Detecting)

Welcome to the Awareness Arcade (Browser-language Detecting)

KnowBe4