The Security Awareness Company is now part of the KnowBe4 family! For more information read our press release here

Reinforcements for Security Awareness Programs

Keep your messaging fresh and in the forefront of your users’ minds with content that reinforces the lessons most important to your organization.

Reinforcement content is not scored nor usually tracked in a formal way, and information is conveyed through a variety of modalities to appeal to different types of users. You will find that when you employ reinforcements successfully, users will learn about twice as much as they would from more traditional, formal training.

This type of content includes monthly newsletters, security video modules, and Security Documents.

Monthly Newsletters

Our popular magazine-quality newsletter offers you an easy way to keep your staff up-to-date on policies and best practices. By presenting important information in a non-technical, conversational tone that appeals to a wide variety of audiences, we make security awareness easy to understand (and fun to read!).

Consistency is vital to the success of any awareness program. Monthly newsletters are a proven way to reinforce and create this consistency!

Reminding users of important messages and policies each month in an approachable, fun manner will help you take strides towards establishing a strong culture of learning and security awareness within your organization, as well as leveraging more informal learning opportunities.


Newsletter Topics & Schedule

Each month, our content is written according to a list of topics we release before the beginning of each year.* This allows the newsletter to remain current while focusing on all of the important issues.

We recommend planning your entire year’s security awareness program around these topics, providing microlearning opportunities (such as posters, games, or videos) along with the newsletter. We often cover the same topics every 12-18 months, addressing them from a different perspective or angle.

* Topics are subject to change based on important infosec issues and/or to stay relevant with up-to-date news.

2022 Newsletter Topics

Jan: 365 Security Awareness
The concept behind “365 security” offers a simple way to view the end goal of awareness programs: encourage people to make security a part of everything they do. We’re kicking the new year off with that as our foundation and building on it by getting back to the basics, identifying a few security resolutions that work for everyone, and addressing why policy is such a vital element of every organization.

Feb: Demystifying Passwords
Ask several different security professionals about passwords and you’ll likely get several different opinions. It’s a challenging topic with roots that date back to the most basic form of security. But the thing everyone can agree on is that strong passwords are a vital part of protecting accounts and data. This month’s newsletter debunks five common myths about passwords, examines how passwords get hacked, and explains what everyone needs to know about password managers. 

Mar: Inside Ransomware
Ransomware attacks represent one of the biggest threats to organizations of all industries. A simple wrong click on a phishing link or attachment could be all it takes to lock up data and disrupt services. This month’s newsletter explores the inner workings of the ransomware business model to provide a deeper understanding of why it’s so successful, and how individuals can help ensure their organization avoids this dangerous form of malware. 

Apr: Getting Personal with Security
The security goal of most organizations is to reduce risk and prevent data breaches. One of the best ways to accomplish that goal is by providing actionable information that every individual can use in their personal lives. Making it personal offers two advantages. First, it helps employees better retain valuable information. Second, it creates a culture of people who prioritize security in all aspects of their lives—a “win-win” for everyone.

May: Dissecting Data Breaches
What is the root cause of most data breaches? What happens to data when it gets stolen? How can organizations in every industry protect information? These questions serve as the focus this month, as we dissect data breaches to find meaningful answers that will help improve security and reduce risk to people, data, and assets. 

Jun: Identity Theft
With enough stolen data, a criminal hacker can assume someone’s digital identity to open fraudulent accounts in their name, file fake insurance claims, and a variety of other scams that all of us want to avoid. This month’s newsletter focuses on the power of personal data by reviewing the different types of identity theft, how they can be prevented, and what to do if you fear your identity has been compromised. 

Jul: Disinformation
With the rise of deepfakes and malicious campaigns spreading fake news, it has become more difficult than ever before to know what to believe. Disinformation exists to intentionally deceive the public, often for political purposes. It can also be used to harm an organization’s reputation and even lead to violence. As such, it’s vital that we all train ourselves to spot fake headlines and tread with caution on social media to prevent harmful information from being spread. 

Aug: Security Mobile Devices
Mobile devices allow people to access almost anything from almost anywhere. Cybercriminals attempt to intercept that access with malicious applications designed to spread malware and steal data. In this month’s edition, we get back to the basics of mobile security by focusing on the fundamentals of protecting the computers in our pockets. 

Sep: Incident Response
If you see something, say something! That mantra still holds true because unfortunately, security incidents happen. It’s the response to them that matters. Every organization needs to have a plan in place and every individual should understand why timely reporting is such a vital part of security, even though preventing incidents in the first place is a top priority. 

Oct: Phishing Fundamentals
From generic attacks to more sophisticated campaigns, such as business email compromise (BEC), phishing continues to dominate the threat landscape as the most common attack method. That’s why it’s important to refresh the fundamentals of why phishing works, how to spot common warning signs, and what actions to take when you encounter a phishing scam.

Nov: Identifying the Pretext
Take a journey through a scammer’s playbook and learn all about pretexting—the falsified stories used to gain and abuse trust. A good pretext can be just enough to encourage a click, convince someone to divulge confidential information, or trick someone into installing malicious software. By getting familiar with common techniques, your organization will be better equipped to identify and circumvent.

Dec: Last Line of Defense
There is no shortage of security technologies and solutions designed to help organizations prevent threats before they ever reach the end-user. But even as those technologies improve, people at every level of every organization still represent the last line of defense. Employees from the front desk to the executive suite ultimately have to identify when they’re being targeted and know how to use situational awareness to protect the access they've been granted. 

Educational Videos

1-5 minute security “bytes” that cover a broad range of topics and include a wide variety of styles. These are great to use every month to keep security in the forefront of your employees’ minds.

Video reinforcements are an easy way to create informal learning opportunities for your employees. Short, focused, to-the-point, videos don’t require assessments and feel less like training and more like how your users already interact online.

HubSpot Video


Security Video Bytes

Security video bytes, like our Cyber Confessions Series, make a great addition to any security awareness training program and will give your users lots of informal microlearning opportunities!

Our current collection of 70+ security video modules are created in a broad variety of styles, from animated scenarios based on true stories to educational documentary style using stock footage. They all provide practical action items and lessons your users can apply both at work and at home.

Security Documents

Security Documents can help keep your users engaged in your security awareness training program!

The key to creating a successful information security awareness training program is to reinforce key messages as often as possible. To do this, you must catch your users’ attention and hold it. That’s where our versatile Security Documents come in!

Security Documents are standalone pages, designed to be eye-catching enough to grab employees’ attention to create teachable moments outside formal learning. These are delivered as PDFs and can be used in a variety of creative ways. You can add these pages onto any other PDF (such as a newsletter or policy document), print them out to use as flyers in bathroom stalls or elevators, or combine them to create a customized magazine on a specific subject. It’s up to you!


Ready to get a sneak peek at all of our great security awareness training materials?

Sign up now to get quick, easy access to view ALL of our security awareness training content within KnowBe4’s Training Preview Portal.

Start Your Preview