Enable employees to be more:
  • Cybersecurity aware

  • Alert to the risks and dangers of a cyber attack

  • Skilled in being cyber safe

Use the programme to:
  • Drive engagement through the lure of something different

  • Deliver key messages that are received AND retained

  • Stand out from everyday information

To coincide with Cyber Security Month this October, we have produced our most comprehensive programme of engaging and practical materials yet.

Integrate it with your cybersecurity awareness strategy to ensure you take full advantage of Cyber Security Month 2022. Help your employees game more consistent control over their security behaviours — both at work and home (which may be the same place!).

The Security Company has been at the forefront of cybersecurity behaviour change for over 20 years. Our library of resources and products cover a range of information and cybersecurity topics that can be deftly and engagingly deployed over the course of Cyber Security Month for maximum employee retention. Our products are quality time savers that will improve the quality of your security culture.

Our Cyber Security Month 2022 programme offers a full range of materials. You have complete flexibility to use them to suit your current focus and messages. You decide which elements to run and when, and the level of customisation (if any). Our clients love the control that comes with consistently high-end TSC collaborations.

Select elements to suit your budget. Don’t forget — these materials are for life, not just Cybersecurity Month. You can use each element as required throughout the year to maximise further return on your Cyber Security Month investment.

  • Flexible – integrates with your existing cybersecurity awareness strategy
  • Compelling – offers a rich variety of content
  • Practical – your employees become safer cybersecurity citizens

Give big cyber risks the attention they deserve by delivering focused messaging

Week 1 — Data loss prevention

  • Introductory email or article
    Introduce the concept of a data lifecycle, strategies for preventing data loss and the ramifications of improper data handling. This introduction also directs people to the additional resources available. 
  • ‘Handling data responsibly’ GIF
    30 second animated GIF featuring top tips on how to handle data responsibly. Perfect for sharing in emails or hosting in multiple locations.
  • Data loss prevention game
    This time challenge game (complete it as quickly as possible) encourages players to correctly identify the behaviours that will prevent data loss.


Request a demo

Week 2 — Responsible use of the cloud

  • Introductory email or article
    Introduce the concept of the cloud and how small changes in behaviour can make a big difference to how fortified your cloud security is.
  • How to use the cloud responsibly’ GIF
    Short animation that features three messages about how to stay safe on cloud networks and how to use the utility responsibly.
  • Cloud control game
    This arcade style game will require players to navigate cyber threats in the cloud and reinforce responsible behaviours with a built in knowledge check 



Request a demo

Week 3 — Authentication hacks

  • Introductory email or article
    Introduces the scale of authentication hacks, the recent rise in these attacks and a case study to contextualise the cyber threat.
  • ‘Authentication hacks primer’ GIF
    Short animation demonstrating how authentication hacks work and how to avoid being a victim of this type of attack. 
  • Authentication hack game
    In this game players are up against an attacker. The player chooses the scenario they want to play i.e., the type of account and the attack method used, with the aim of the game to be cyber savvy and have all the protections in place to stop an attack.



Request a demo

Week 4 — Account hijacking

  • Introductory email or article
    Introduces account hacking as an attack method and its renewed prevalence. This introduction contains two real case studies in both a business environment and identity theft scenario.
  • ‘How does account hijacking work?’ GIF
    Short animation demystifies and demonstrates how account hijacking works in a business context. 
  • Account hijacking game: 
    Loosely based on snakes and ladders, this game helps employees retain vital cybersecurity information by injecting some good old fashioned competitive gaming into the learning process. 



Request a demo

Get notified as soon as you can order this programme

Please leave your details below and we'll be in touch:


How to use your Cyber Security Month 2022 programme

The materials can be used as:

  • A standalone campaign
  • Part of your existing information security awareness programme
  • A launch platform for your new cybersecurity programme


Whether you purchase the complete bundle or individual elements, we will apply a call to action (CTA) and logo where appropriate.

This website uses cookies, by continuing to use the site you agree to using cookies. Continue Privacy Policy