Cyber awareness resources

Use these cyber awareness assets in your emails and social media posts to keep cybersecurity top-of-mind with your employees

The Human Side of Cybersecurity

This whitepaper explains the methodology behind the Human Risk Assessment
eBooks
Learning Tools
Free NIS2 Directive resource bundle

Packed with a detailed NIS2 eBooks, a handy checklist, and quick access to our engaging YouTube vide...

eBooks
Whitepapers
NIS2 Directive: Responsibilities of Board of Directors and Executives

Essential resource for executives and board members who need to navigate the NIS2 Directive

Checklists
NIS2 Directive Readiness Checklist for Executives

Effortless Self-Assessment Tool for Executives: Evaluate Your Readiness for the NIS2 Directive

Whitepapers
Human Cyber-Risk Assessment Report

A comprehensive report on unexpected behaviors employees exhibit when faced with phishing cybersecur...

eBooks
Learning Tools
Cybersecurity for Beginners

Cybersecurity for Beginners - free ebook written in a simple way for non-techies and techies alike

Whitepapers
Free Cybersecurity Stakeholder Analysis

Over 160 cybersecurity leaders shared with us their opinions and experiences.

Whitepapers
The Human Factor in Cybersecurity

How organizations can enhance employees’ resilience and identify key cybersecurity behaviors

Posters
Free Security Awareness Posters and Stickers

15 posters and messages to recognize cyber secure behavior

Join top companies worldwide in the mission to make workplaces cyber-safe

Get started free

Stay on top of cybersecurity threats

What Is Tailgating in Cybersecurity? The 'Politeness Trap' Explained

You're walking into your office with a hot coffee in each hand when a friendly stranger catches the door for you. You smile, nod, and walk right in......

What Is Spear Phishing? A Guide to Precision Cyberattacks (2026)

On a Tuesday morning in October 2025, a senior accountant at a mid-sized firm received an email from their CEO. It wasn't a generic blast. The...

What is a UID? The Complete Guide to Unique Identifiers in 2026

What if the most effective way to secure your organization isn't a million-dollar firewall, but a simple string of characters? You likely feel the...

What Is Spear Phishing? The 2026 Guide to Understanding the Human Hack

At 9:42 AM on a Tuesday, your head of finance receives an email that appears to come from your CEO. It references a specific confidential contract...

SCORM Compliant Security Training: The 2026 Guide to Engaging Your Workforce

What if your 98% completion rate is actually your biggest security vulnerability? It's a frustrating reality for many IT leaders who see perfect...

Employee Cybersecurity Risk Audit: The 2026 Implementation Guide

What if the data your C-suite actually wants isn't found in your firewall logs, but in your breakroom? You've likely felt the frustration of...

Choosing the Best Phishing Simulation Platform in 2026: A Buyer’s Guide

What if the metric that matters most isn't how many people click, but how many people actually report the threat? By 2026, AI-driven social...

Insider Threat Awareness: Building a Culture of Vigilance, Not Suspicion

Did you know that the average annual cost of internal security incidents jumped to $15.4 million in 2022? According to the Ponemon Institute, that is....

The Ultimate Security Awareness Training Topics Checklist for 2026

Your employees aren't your biggest vulnerability; they're your most underutilized security asset. You've likely felt the frustration of watching 24%.....

Spear Phishing vs. Phishing: Understanding the Human Risk in 2026

What if your most expensive security software is actually making your team less safe by creating a false sense of security? In 2026, the latest Human....