Cybersecurity blog Cybersecurity blog
2 New Cybersecurity Videos: Spear Phishing & Password Handling
Facebook Twitter LinkedIn

2 New Cybersecurity Videos: Spear Phishing & Password Handling

Ásta Guðrún Helgadóttir
4 min read ∙ May 17, 2022

People often say that there are two things certain in life: death and taxes. However, that sounds bit bleak considering that summer has arrived. Perhaps we should paraphrase it to: “There are two things certain in this life: phishing and taxes”. We’ve just published two new cybersecurity videos about phishing and passwords that might help you out this summer.

Still from our cybersecurity videos about spear phishing. A woman stands in kitchen holding a cup of coffee. All around is dachshund memorabilia to show her special interest in a specific dog breed.
When cybercriminals target a specific person or type of people with cleverly designed phishing emails it is called spear phishing.

There is a good reason to be on alert! Unsurprisingly, scammers don’t take vacations and still we’ve never read news stories of hackers with burnout?! Summer is the perfect season to confound people, professionals and laypersons alike, with various phishing techniques.

But as we at AwareGO say: If you know they’re coming, you can stay alert and aware. In our latest releases we introduce two new cybersecurity videos. One of them is about spear phishing and the other about password sharing. Both are important to stay cyber-secure not only during the summer but the whole year round.

New Cybersecurity Video: Spear Phishing

In our latest video about Spear Phishing we address the key ingredient of a successful phishing attack: knowing something about the target. Spear phishing is when a cybercriminal has a specific target and tailors their phishing attempt to a person’s interests or hobbies. The more targeted the phishing attack is, the more likely it is to be successful. This is why it is so important to be careful when sharing information about oneself on social media. Any information about you can give cybercriminals the crucial information they need to tailor a phishing attack against you.

Still from our cybersecurity videos about spear phishing. A woman sits in sofa in front of laptop. All around is dachshund memorabilia to show her special interest in a specific dog breed.
Your interests and hobbies can be used against you to target you with spear phishing emails.

New Cybersecurity Video: Password Sharing

Some things are just meant to be private. Passwords are one of those things that should not be shared with anyone, not even your accountant. This episode addresses the security risk of sharing your password with others by drawing the analogy of sharing one’s toothbrush. Would you really share your toothbrush with a friend or a friendly stranger?

Still from our cybersecurity videos about password handling. A man lends his toothbrush to a woman at campsite.
Would you lend your toothbrush to anyone?

This cybersecurity video sure has the shock factor – if your employees don’t think twice about sharing their passwords after seeing this they probably also share their toothbrush! Don’t believe us… take a look:

Steer Clear of Phishing

Cybersecurity videos about phishing are all well and good but we always compliment them with more information. Here are some red-flags that might help you determine whether an email is legit or phishing:

Still from one of our cybersecurity videos about spear phishing. A laptop screen on sofa table. All around is dachshund memorabilia to show special interest in a specific dog breed.
Hover over links in emails to see the real URL and check if the domain looks legit.
  1. Check the URL in the email of the sender. Does it match to the official domain of the organization it is claiming to be? may sound like a legit email, but how about
  2. Phishing emails often rely on a sense of urgency. This is done to make people act without thinking, clicking a link, or transferring money. No legitimate service or institution would ask you to react to an email within 24 hours. They give out plenty of warning if something is amiss.
  3. Phishing is often linked to identity theft and may require you to upload IDs, such as passports or ID cards, or just your credit card number. Alternatively they might ask you to log in to fix something in your account. Links in such emails will send you to a spoofed website that looks similar to the real one and then steal your log-in credentials which they can then reuse or abuse.
  4. If you’re unsure about whether an email is legit, go to your account by typing the URL into your browser instead of following the link. You can also contact the organization in question via the contact information provided on their official website. Do not trust the information given in the email!

For more information about the various types of phishing and how to avoid them download our School of Phish pamphlet.

Try our videos and Human Risk Assessment for free!

Sign up – no credit card or commitment needed.

Ásta Guðrún Helgadóttir
4 min read ∙ May 17, 2022

Become cyber secure

You and your employees are going to love AwareGO. It’s a modern, cloud-based system for managing human risk, from assessment to remediation. We’ve made it super easy — schedule your first assessment or training in minutes.

Get started for free and give it a go right now.

You’ll love the way AwareGO can fit into your existing infrastructure. Our robust APIs, widgets, and content available in SCORM format make sure that the integration is seamless. We also integrate with Active Directory, Google Workspace, and popular tools like Slack and Teams.

Contact us and our experts will recommend the best way to integrate.

Upgrade your cybersecurity business by adding human risk management to your existing portfolio of services. Increase your deal size by leveraging Human Risk Assessment or offering Security Awareness Training to your current customers and creating a new revenue stream.

Contact us to become an AwareGO partner, and we will support you every step of the way.

Join top companies worldwide in the mission to make workplaces cyber-safe

Get started free
blank blank blank blank blank blank blank blank blank blank