Apps that track your data

This graphic, suitable for use as a standalone poster, in a newsletter, or in your Workday or other employee feed, clearly shows the shocking amount of personal information collected by popular apps.

Cybersecurity by the numbers

An easy-to-grasp overview of the current cybersecurity climate demonstrates why cyber hygiene matters to employees. This PDF takes a look at today’s digital threatscape through graph images, putting the stats in perspective.

Includes:

How can you make the best use of this PDF?

Aware Force cybersecurity awareness content is branded for your organization and perfect for:

Google is changing the way it tracks you online. Now what?

Here’s a live-scoring, five-question quiz that covers how big websites are tracking our behavior as privacy requirements are getting stricter. The quiz remains online for one year from the date of purchase.

Click here to view the quiz

No PII is collected in the default format. You also have the option to identify and score individual players.

Intro to Password Managers

Here are password managers' basic definitions and characteristics for employees’ personal computers. You will find answers to many questions that employees want to ask through this PDF. A great branded-for-you company reference.

Lessons from the biggest breaches of the past year

Live-scoring is a five-question quiz with actionable lessons learned from five of the year’s biggest cyber breaches, including 23andme, T-Mobile, Norton LifeLock, and LastPass.

Click here to view the quiz

No PII is collected in the default format. You also have the option to identify and score individual players.

Password sharing poster

Introducing our newest collection of Cybersecurity posters, showcasing a retro aesthetic that's both timeless and engaging. This is one of four images that feature AI-generated characters and a '70s-inspired design, making them universally appealing. They serve as an additional reminder to your workforce regarding the paramount importance of password protection. Print for posting in buildings or share via your internal communication tools.

Pig Butchering Infographic

It's an odd name, but it's a huge cybersecurity issue. This graphic, suitable for use as a standalone poster, in a newsletter, or in your Workday or other employee feed, demonstrates firsthand how criminals use social engineering tactics to approach their victims and steal their money.

We show a real example, analyze the steps being taken, and point out the red flags indicating this is a scam.

Video conference like a pro

Zoom, Teams, WebEx, Workspace, and many others are a big part of many employees’ work experiences. How can they look more like TV personalities than shadow figures? Proven tips on what they can do to best represent your company.

What to do after a big breach

It’s a live-scoring, five-question quiz with clear messaging and actionable advice. It’s a solid asset to roll out following a high-profile breach involving a familiar brand name. The quiz remains online for one year from the date of purchase.

Click here to view the quiz

No PII is collected in the default format. You also have the option to identify and score individual players.