Cybersecurity blog Cybersecurity blog
New cybersecurity videos: Risks beyond phishing
Facebook Twitter LinkedIn

New cybersecurity videos: Risks beyond phishing

Guðrún Vaka Helgadóttir
5 min read ∙ Jan 26, 2021

We produce and release new cybersecurity videos all the time to keep up with our clients’ needs and the latest news. What is the greatest risk in your workplace when it comes to cybersecurity?

Phishing is usually the number one culprit, of course, but phishing attacks come in so many forms. That’s why we try to address as many of them as we can along with raising awareness of other types of risks.

This month we released four new cybersecurity videos.
Two of them are related to phishing attacks but the other two are on very different ends of the cybersecurity spectrum. Let’s take a sneak peek!

New cybersecurity video: Zoom Bombing 

Getting gatecrashers at an important business meeting is no fun, but this video sure is! No matter what video conference software you might be using (no it’s not just Zoom), it’s important to keep the invite links as safe and private as possible and change them regularly.

It goes without saying that meeting links should never be shared on public forums. Also, make sure to enable all security features offered by the software. This could mean features that allow only the host to share their screen and/or files to participants, password-protecting the meeting, and making participants wait to get accepted by the host before they join the meeting. It’s important to keep our meeting rooms safe for everyone.

Make sure your meetings are “invite only”.

New cybersecurity video: Microsoft Office Risk 

Hackers discovered a long time ago that Microsoft Office documents were perfect for sneaking viruses and malicious code to people via email. They hide malicious codes in the Office documents’ micro scripts (macros) and then send them to unsuspecting recipients.

It’s easy to get confused and accidentally open the wrong document from the wrong sender. Microsoft Office tries to mitigate this risk by disabling the macro features of the documents when you first open them. This allows you to see the data inside without risk. If you need to edit the document, you can choose to enable the macro features and make the document editable. And herein lies the risk.

It is recommended to only enable editing on Microsoft Office documents if really necessary, if the sender is known and trustworthy and if the document was expected. 

Enabling editing on Microsoft Office documents could open up a window to all kinds of bad things.

New cybersecurity video: Ransomware Attack 

The most noteworthy ransomware attack in recent years was the attack on Garmin. It leads to the company’s devices, used all over the world by millions of people, being unable to sync their fitness data for five days.

The attack on Garmin is believed to have started when an unsuspecting employee accepted a software update from a website. The website was probably a well-known website that the user trusted. Unfortunately, it had been compromised by hackers to offer this malicious software update. 

Even trusted websites that we visit often can become pawns in a bigger game for hackers. They are used to trick people into downloading malware or ransomware. Software updates and downloads offered by a website – any website – should not be trusted.

New cybersecurity video about ransomware. Picture shows how ransomware spreads between networked computers metaphorically with red beams.
If ransomware gets into one networked computer it will spread to the others and then work on stealing and locking up data.

New cybersecurity video: Conference Risk 

We should always be aware that gifts in the form of portable memory drives or charging banks might be used to spy on you. USB flash drives can be very useful when it comes to transferring data, however, they can pose a risk to you and your workplace.

Every device that can be connected via USB could potentially infect your computer with malware or upload spyware. USB devices are often an important part of data security and transfer within a workplace. Many employees must rely on them. Instead of banning them, organizations create a set of guidelines regarding their use and/or invest in technical security measures.

These guidelines and security measures will only work if we stay vigilant and aware that portable USB drives and charging banks can pose a threat to us.

Don’t trust USB devices from just anyone.

How to watch the videos

Our new cybersecurity videos are available to our clients within our online training solution. You can sign up for a free trial of our training solution (no commitment or credit card needed) and check out all our videos in there. Test out our solution by sending a few of them to your employees or coworkers.


Don’t want to sign up? You can watch some of our cyber security training content here.

Did you know that we offer our content in 12 different languages? It’s important to give employees training in a language they understand. Today we offer the following languages:

  • English (US)
  • English (UK)
  • German
  • French
  • Spanish (Castilian)
  • Danish
  • Norwegian
  • Swedish (NEW!)
  • Finnish (NEW!)
  • Icelandic
  • Chinese Mandarin (subtitles only – full language coming soon)
  • Polish (subtitles only – full language coming soon)

This year we’re adding at least six new languages including Chinese, Polish, Dutch and Russian.

The trick to cybersecurity training

Security awareness training is not something that happens overnight. The AwareGO cybersecurity training method relies on short, entertaining cybersecurity videos.

The videos help raise awareness of the risks and promote better behavior. They come with short “further reading” texts and a quiz at the end.

The trick is doing security awareness training continuously with short reminders instead of making it a one-time thing. That way the training has no effect on productivity but even more effect on people’s behavior and information retention. It gives them something to think about without overwhelming them with a deluge of information.

It teaches awareness and the right behavior without taking people away from their important projects and disrupting their day. That’s what we call the AwareGO way!

Guðrún Vaka Helgadóttir
5 min read ∙ Jan 26, 2021

Become cyber secure

You and your employees are going to love AwareGO. It’s a modern, cloud-based system for managing human risk, from assessment to remediation. We’ve made it super easy — schedule your first assessment or training in minutes.

Get started for free and give it a go right now.

You’ll love the way AwareGO can fit into your existing infrastructure. Our robust APIs, widgets, and content available in SCORM format make sure that the integration is seamless. We also integrate with Active Directory, Google Workspace, and popular tools like Slack and Teams.

Contact us and our experts will recommend the best way to integrate.

Upgrade your cybersecurity business by adding human risk management to your existing portfolio of services. Increase your deal size by leveraging Human Risk Assessment or offering Security Awareness Training to your current customers and creating a new revenue stream.

Contact us to become an AwareGO partner, and we will support you every step of the way.

Join top companies worldwide in the mission to make workplaces cyber-safe

Get started free
blank blank blank blank blank blank blank blank blank blank