Cybersecurity blog Cybersecurity blog
4 New Cybersecurity Awareness Video Lessons: Risks Beyond Phishing
Facebook Twitter LinkedIn

4 New Cybersecurity Awareness Video Lessons: Risks Beyond Phishing

Guðrún Vaka Helgadóttir
6 min read ∙ Jan 26, 2021

Table of Contents:

  1. Zoom Bombing
  2. Microsoft Office Risk
  3. Ransomware Attacks
  4. Conference Risk

We produce and release new cybersecurity awareness video lessons all the time to keep up with our clients’ needs and the latest news. What is the greatest risk in your workplace when it comes to cybersecurity?

Phishing is usually the number one culprit, of course, but phishing attacks come in so many forms. That’s why we try to address as many of them as we can along with raising awareness for other types of risks.

Recently we released 4 new cybersecurity awareness video lessons.
Two of them are related to phishing attacks but the other two are on very different ends of the cybersecurity spectrum. Let’s take a sneak peek!

New Cybersecurity Awareness Video: Zoom Bombing 

Getting gatecrashers at an important business meeting is no fun, but this video sure is! No matter what video conference software you might be using (no it’s not just Zoom), it’s important to keep the invite links as safe and private as possible and change them regularly.

It goes without saying that meeting links should never be shared on public forums. Also, make sure to enable all security features offered by the software. This could mean features that allow only the host to share their screen and/or files to participants, password-protecting the meeting, and making participants wait to get accepted by the host before they join the meeting. It’s important to keep our meeting rooms safe for everyone.

Make sure your meetings are “invite only”.

New Cybersecurity Awareness Video: Microsoft Office Risk 

Hackers discovered a long time ago that Microsoft Office documents were perfect for sneaking viruses and malicious code to people via email. They hide malicious codes in the office documents’ micro scripts (macros) and then send them to unsuspecting recipients.

It’s easy to get confused and accidentally open the wrong document from the wrong sender. Microsoft Office tries to mitigate this risk by disabling the macro features of the documents when you first open them. This allows you to see the data inside without risk. If you need to edit the document, you can choose to enable the macro features and make the document editable. And herein lies the risk.

It is recommended to only enable editing on Microsoft Office documents if really necessary, if the sender is known and trustworthy and if the document was expected. 

Enabling editing on Microsoft Office documents could open up a window to all kinds of bad things.

New Cybersecurity Awareness Video: Ransomware Attack 

The most noteworthy ransomware attack in recent years was the attack on Garmin. It leads to the company’s devices, used all over the world by millions of people, being unable to sync their fitness data for five days.

The attack on Garmin is believed to have started when an unsuspecting employee accepted a software update from a website. The website was probably a well-known website that the user trusted. Unfortunately, it had been compromised by hackers to offer this malicious software update. 

Even trusted websites that we visit often can become pawns in a bigger game for hackers. They are used to trick people into downloading malware or ransomware. Software updates and downloads offered by a website – any website – should not be trusted.

New cybersecurity awareness video about ransomware. Picture shows how ransomware spreads between networked computers metaphorically with red beams.
If ransomware gets into one networked computer it will spread to the others and then work on stealing and locking up data.

New Cybersecurity Awareness Video: Conference Risk 

We should always be aware that gifts in the form of portable memory drives or charging banks might be used to spy on you. USB flash drives can be very useful when it comes to transferring data, however, they can pose a risk to you and your workplace.

Every device that can be connected via USB could potentially infect your computer with malware or upload spyware. USB devices are often an important part of data security and transfer within a workplace. Many employees must rely on them. Instead of banning them, organizations create a set of guidelines regarding their use and/or invest in technical security measures.

These guidelines and security measures will only work if we stay vigilant and aware that portable USB drives and charging banks can pose a threat to us.

Still from AwareGO cybersecurity awareness video about conference risks. Two volunteers hand out blue gift bags that contain infected usb drives.
Don’t trust USB devices from just anyone.

How to Watch the Videos

Our new cybersecurity awareness video lessons are available to our clients within our online training solution. You can sign up for a free trial of our training solution (no commitment or credit card needed) and check out all our videos in there. Test out our solution by sending a few of them to your employees or coworkers.

Screenshots from AwareGO's platform showing how to select a security awareness video for training

Don’t want to sign up? You can watch some of our cyber security training content here or visit AwareGO’s YouTube Channel for even more cybersecurity awareness videos.

Did you know that we offer our content in 18 different languages? It’s important to give employees training in a language they understand. Today we offer the following languages:

  • English (US)
  • English (UK)
  • German
  • Dutch
  • French
  • Spanish (Castilian)
  • Spanish (Latin American)
  • Portuguese (Latin American)
  • Italian (coming in 2023)
  • Danish
  • Norwegian
  • Swedish
  • Finnish
  • Icelandic
  • Chinese Mandarin
  • Polish
  • Russian
  • Czech (subtitles only)
  • Filipino

The Trick to Cybersecurity Awareness Training

Cybersecurity awareness training is not something that happens overnight. The AwareGO cybersecurity training method relies on short, entertaining cybersecurity awareness videos.

The videos help raise awareness of the risks and promote better behavior. They come with short “further reading” texts and a quiz at the end.

The trick is doing cybersecurity awareness training continuously with short reminders instead of making it a one-time thing. That way the training has little effect on productivity but even more effect on people’s behavior and information retention. It gives them something to think about without overwhelming them with a deluge of information.

It teaches awareness and the right behavior without taking people away from their important projects and disrupting their day. That’s what we call the AwareGO way!

Get a free trial

With a free trial you can check out our platform, all our content and also our Human Risk Assessment, a new way to identify, measure and remedy lack of cybersecurity awareness.

Guðrún Vaka Helgadóttir
6 min read ∙ Jan 26, 2021

Become cyber secure

You and your employees are going to love AwareGO. It’s a modern, cloud-based system for managing human risk, from assessment to remediation. We’ve made it super easy — schedule your first assessment or training in minutes.

Get started for free and give it a go right now.

You’ll love the way AwareGO can fit into your existing infrastructure. Our robust APIs, widgets, and content available in SCORM format make sure that the integration is seamless. We also integrate with Active Directory, Google Workspace, and popular tools like Slack and Teams.

Contact us and our experts will recommend the best way to integrate.

Upgrade your cybersecurity business by adding human risk management to your existing portfolio of services. Increase your deal size by leveraging Human Risk Assessment or offering Security Awareness Training to your current customers and creating a new revenue stream.

Contact us to become an AwareGO partner, and we will support you every step of the way.

Join top companies worldwide in the mission to make workplaces cyber-safe

Get started free
blank blank blank blank blank blank blank blank blank blank