Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Everything You Need to Know About Public Wi-Fi: Risks, Security, and Safety Tips
Mateo is looking for a stable public Wi-Fi connection. But each one turns out to have its own dangers, and his friend Neena shows him how to stay safe.

Malware Forecast: What You Need to Know for 2025
A malware storm is rolling in, and Cecil is the guy to tell you what to do! Harold learns about the dangers of malware while Cecil walks him through the best ways to defend yourself.

Need to Know IoT: Essential Insights and Information
Smart devices may not be smart choices when it comes to office security. Join Ivana and Erica as they check out the potential dangers of unshielded IoT.

Need to Know Too Much Information: What You Should Be Aware Of
In the cafeteria, Anthony teaches Karen the importance of not giving out more information than someone needs.

Proper Disposal: Essential Information You Need to Know
The office wants to properly dispose of a broken piece of equipment. Unfortunately, they haven't gotten the idea of 'proper disposal' quite right. Join Anthony and Mr. Louis as they pay their respects to one dearly departed printer, and how to properly dispose of electronic devices.

Unauthorized Cloud Services: What You Need to Know and How to Protect Your Data
Anthony and Harold talk about safe cloud storage ... and the unsafe cloud storage that Harold is already using. Oops. Learn how to properly use cloud services, and how improper use can be a serious risk.

Clone Phish: Understanding Marine Lowlifes and Their Impact
Sink into the depths to observe the Clone Phish, which disguises itself as a previously trustworthy message to lure in prey.

Cybersecurity Introduction: Essential Knowledge You Need to Know
Grab some coffee and get ready to learn! Discover what cybersecurity is, why it’s important, and what it could mean for you and your company.

PCI DSS Physical Security: Best Practices for Protecting Cardholder Data
Explore the details of the PCI DSS regulation and how it relates to physical security issues like visitors and work areas, and what it might mean for your organization.

Phishing: What You Need to Know to Stay Protected
Learn how to spot the bait as Anthony guides his friend Cecil through the dangers of phishing. Is this actually a very exciting email from the boss, or is it just another hacker’s trap?

Safe Web Browsing: Essential Tips for Protecting Your Online Privacy
It’s a jungle in there. Explore the winding paths of the internet with Anthony and Cecil as they venture into thorny areas like fake browser warnings, HTTPS and dangerous URLs.

Essential Guide to Password Security: Tips for Protecting Your Online Accounts
A system is only as secure as its password. Join Anthony and Daryl as they get to grips with the challenges of creating a strong password … because safety is not as easy as 1-2-3.

Essential Guide to Removable Media: What You Need to Know
Can a thumb drive topple a company? It’s more likely than you think. Join Anthony and Harold as they check out the dangers of removable media — the good, the bait and the ugly.

Essential Tips for Working Remotely: What You Need to Know
Sometimes, trouble follows you home. Join in as Anthony and Ben explore the dangers of working remotely — from password cracks to malware attacks.

Everything You Need to Know About Privacy by Design
Sometimes, two heads are NOT better than one. Follow along as Harold and Cecil make a bad decision about data gathering and discover the importance of privacy by design.

Marine Lowlifes: Common Phish
Dive into the Sea of Emails for a closer look at one of the oldest scams still swimming today: the Common Phish. Learn what it is, how to detect it, and what it could mean for you and your organization if you take the bait.

Need to Know for Strong Passwords: Tips for Creating Secure Passwords
Anthony helps Harold create a new, strong password. Turns out what you really need is just a little more ... creativity. Learn what makes a strong password really secure, and how to build an effective one.

Need to Know Malware: What You Should Understand to Stay Protected
Trojan horses, worms, RATs — There’s a whole animal kingdom of malware out there. Join Anthony and Fiona as they explore the best ways to keep malware from migrating into your system.

Need to Know: Clean Desk Policy
The company prepares for a Clean Desk Competition, but Ben doesn't seem to understand the point ... or does he? Learn about how to protect sensitive information at your physical workspace to prevent cyberattacks.

Essential Social Engineering Training: What You Need to Know
Some hackers don’t need computers at all. Join Anthony and Erica in exploring the dirty business of social engineering — when all it takes is a lie to crack open a company.

Need to Know: Email Security
It's a spam attack when Karen uses her work email to sign up for a shopping site. Can Anthony brave the storm, or are they both destined to sink under the storm of questionable email ads?

Essential Guide to Mobile Security: What You Need to Know
Join Anthony and Ivana as they explore the ups and downs of phone security. What is encryption? What kind of damage could a stolen phone do? Learn how to take security with you wherever you go.

Marine Lowlifes: Spearphish
Target sighted! Follow the hunt of that vicious but sometimes misaimed predator, the Spearphish.

Marine Lowlifes: Whaling Shark
The wonders of nature are displayed up close as the Whaling Shark chases its prey, the powerful and important Whale. Learn what it is, how to detect it, and what it could mean for you and your organization if you take the bait.