Welcome to Your Free
Cybersecurity
Awareness Month Resource Kit

We hope these assets help you and your users defeat whatever cyber villains you may come across!

Your users are frontline defenders in the cyber battle. Equip them with our free week-by-week security content, ready-to-use email templates and engagement activities. These essential tools will strengthen your organization's defenses against digital threats. Prepare to level up your security posture!

The Tutorial Level: Making the Most of the Content

Cybersecurity Awareness
Month Strategy Guide

This guide walks you through user resources included in your kit, suggestions for how to use them and campaign ideas to get you started.

Cybersecurity Awareness
Weekly Planner

This interactive training planner is packed with all of the great resources for users you see below. We put them into a weekly plan as an example for when to send each of the resources to your users.
Week 1
title-level1
General Cybersecurity
The most basic and prevalent cyberthreats are no excuse for your users to keep their guard down. The goal of the first week is an introductory level to a variety of common cyberthreats that continue to take a toll on organizations of all sizes

Featured Training Module:  Insights from a Hacker: Social Engineering Red Flags

Social engineering is one of the main tricks cybercriminals use to get people to take actions that go against their or their organization's best interests. To stay safe online and protect yourself and your organization, it is vital that you don't fall for these tricks. In this 10-minute module, you will meet a social engineer and learn how to spot the red flags and signs of danger associated with common social engineering methods.
Your employees will learn:
What motivates hackers What motivates hackers
The different varieties of phishing attacks The different varieties of phishing attacks
How to spot the red flags of social engineering How to spot the red flags of social engineering
We’ve provided you with a full suite of assets for Week 1.
Power-Ups Included:
Security Culture and You
Video Module
Power Up Your Password Security
Power Up Your Password Security
Infographic
Power Up Your Password Security
Power Up Your Password Security
Poster
Stay Alert for Messaging Scams
Stay Alert for Messaging Scams
Security Doc
Week 2
Level 2
AI THREATS
Few threats have rocketed to the top of the infosec world’s worry list like AI-powered phishing emails, scams and deepfakes. The goal of the second level and the associated focus content is to ensure your users are well-versed in these threats both as they go about their work life and explore the internet in their down time.

Featured Training Module: Mobile-First Module - AI, Phishing, And Cybersafety

This five-minute module, designed for use on a mobile device, gives a high-level overview of how cybercriminals can use AI to power cyberattacks and how users can take steps to prevent becoming a victim.
Your employees will learn:
Why AI-powered phishing is on the rise Why AI-powered phishing is on the rise
Warning signs of AI-generated social engineering attacks Warning signs of AI-generated social engineering attacks
How to say secure while using AI programs How to say secure while using AI programs
We’ve provided you with a full suite of assets for Week 2.
Power-Ups Included:
AI and Sensitive Info Don’t Mix
Video Module
Cybersmart Safety Tips
Cybersmart Safety Tips
Infographic
Deepfakes
Deepfakes
Poster
Protect Your Digital Data
Protect Your Digital Data
Security Doc
Week 3
title-level3
RANSOMWARE
A threat cybercriminals keep shelling out the coin for, ransomware threatens all corners of the cyberworld. Help your users navigate the third level of Cybersecurity Awareness Month with the equipment and know-how they’ll need to be ransomware-ready.

Featured Training Module: Interactive Training Module - Ransomware Ready:

This five-minute module will empower employees to make smart security decisions to protect against ransomware attacks.
Your employees will learn:
Ransomware impacts Ransomware impacts
How to spot an attack How to spot an attack
How to prevent a ransomware infection How to prevent a ransomware infection
We’ve provided you with a full suite of assets for Week 3.
Power-Ups Included:
Cloud Ransomware Demo
Video Mobile
Major Keys to Ransomware Protection
Major Keys to Ransomware Protection
Infographic
Jaws: Don’t Be a Victim
Jaws: Don’t Be a Victim
Poster
Your Role
Your Role
Security Doc
Week 4
level4-title
INCIDENT REPORTING
Combining all your users have learned throughout the week, the fourth and final level is all about making sure they know what to do when they see something. From reporting phishing emails to seeking help from IT, sharing when something seems not right is one of the most important steps in helping to keep our/your organization cybersecure.

Featured Training Module: Interactive Training Module - Links and Attachments: Think Before You Click

This 10-minute module explains how cybercriminals use links and attachments to target users and what users can do about it.
Your employees will learn:
The dangers behind suspicious links The dangers behind suspicious links
How to handle any unexpected links or attachments they receive How to handle any unexpected links or attachments they receive
Why reporting suspected phishing attacks is important Why reporting suspected phishing attacks is important
We’ve provided you with a full suite of assets for Week 4.
Power-Ups Included:
QR Codes: Safe Scanning
Video Module
Don’t Get Hooked: Report Every Phishing Attempt
Don’t Get Hooked: Report Every Phishing Attempt
Infographic
Catch Sight of a Concern? Help Others Learn!
Catch Sight of a Concern? Help Others Learn!
Poster
Phishing, Physical Security, and Data Breaches, Oh My!
Phishing, Physical Security, and Data Breaches, Oh My!
Security Doc
Bonus Level
Resources for You

FAIK Everything: The Deepfake Playbook, Unleashed

Watch this heart-stopping webinar where Perry Carpenter, KnowBe4's Chief Human Risk Management Strategist, rips the mask off the alarming rise of AI-powered social engineering. Whether you're a security leader, red teamer, risk manager, or anyone responsible for keeping your organization safe in this brave new world, this session is your ticket to staying ahead of the curve.

7 Best Practices For Implementing Human Risk Management

Read this guide to explore seven key ways to create an HRM plan that reduces cyber risks by changing employee behavior and building a stronger security mindset.
KnowBe4