S-Bytes
FunFoSec Microlearning Series
Welcome to FunFoSec, the microlearning series from SucceedLEARN Security Awareness that redefines how your employees interact with cybersecurity. Say goodbye to tedious training and hello to short, engaging, and entertaining cybersecurity sessions delivered right into your inbox!

Why FunFoSec?
Traditional cybersecurity training is often dull and repetitive, leading employees to tune out and miss crucial information. FunFoSec flips the script by delivering short, humorous, and highly memorable security lessons that employees will genuinely look forward to.
Key Benefits of
FunFoSec:
Demesne far hearted suppose venture excited see had has. Dependent on so extremely delivered by.
FunFoSec Video Library
Here’s an overview of our engaging microlearning videos, categorized to address both foundational cybersecurity topics and the latest emerging threats:
Physical Security

Clean Desk Policy:More Than Just Wiping Away Dust!
Understand the importance of securing sensitive information physically, beyond just tidying the desk.

The Dinner,The Dash, and the Laptop Panic!
Bob highlights the risks associated with leaving company laptops unattended while traveling or in public areas.

Gentleman in Crisis:Bob vs. The Endless Queue!
Humorous insights on how politeness can lead to serious physical security breaches through tailgating.

Bob's Wild Visitor Adventure:Importance of Visitor Management
The necessity of strict visitor management, hilariously depicted through Bob's chaotic visitor experience.
3rd Party Apps

Navigating the AI Wave:Safe Use of AI Dos and Don'ts
Risks of unauthorized AI tool usage demonstrated by Richard, emphasizing safe and compliant use of AI.

Richard's Presentation Predicament:Click Wrap Agreements
Richard learns the pitfalls of casually accepting online license agreements without reading.
Account Security

Password Pandemonium
Demonstrates the dangers of weak passwords through Bob's humorous yet eye-opening experience.

Bob's Weekend and the MFA Fatigue Fraud
Bob experiences how persistent authentication prompts can lead to account compromise via MFA fatigue attacks.

Bob Locks it All—But What's Missing? (2FA)
Importance of Two-Factor Authentication shown by Bob's incomplete security measures.

Protect Your Mobile Devices: A Cautionary Tale
Simple yet essential tips to safeguard mobile devices and the valuable data they contain.

Click, Crash, Chaos: A Senior Manager's Cyber Slip-Up
Senior managers' account security is critical—highlighted through Bob's hilarious yet cautionary mishap.
Remote Working

Public WiFi Perils:Bob's Brewing Disaster
Risks of unsecured WiFi networks humorously illustrated through Bob's coffee-shop catastrophe

Work from Home Gone Wild
Protecting office devices at home becomes crucial in Jane's funny yet instructional remote-work scenario

The Perils of Public Display of Information
Risks involved with unintentionally exposing company data in public spaces, vividly depicted.

Meeting Mayhem:Lost Control
How insecure video conferencing settings can lead to serious privacy and security embarrassments.

The Mobile Life:Balancing Connection and Security
Strategies for securing mobile work devices without sacrificing connectivity or convenience.
Social Engineering

Bob's WhatsApp Woes:A Cautionary Tale
Bob's casual WhatsApp communications highlight how easily unofficial messaging can jeopardize data security.

Richard's Over-Share Ordeal
Demonstrates the dangers of oversharing sensitive information through social media channels.

Conversation Hijack and the Moonwalk Menace
How hijacked conversations lead to serious data breaches—wrapped in comedic missteps.

Richard's Close Call:The Perils of Deep Fake Attacks
Introduction to the deep fake threat with Richard's funny yet alarming incident.

A Whale of a Mistake
Pete learns how hackers target senior executives through urgent requests (whaling), leading to a humorous office disaster.

Richard's Work-life Imbalance:Costly Communication
The hazards of using WhatsApp for official business communications, leading to significant misunderstandings.
Phishing

Bob Tweets, Scammers Eat !
Demonstrates Angler phishing attacks, where public complaints are exploited by scammers.

The Cost of Free:Richard's Phishing Lesson
Richard learns the hard way that irresistible offers can be costly phishing scams.

Bob's Email Scare:A Lesson in Online Security
Bob faces an urgent phishing email attack, emphasizing caution with unsolicited urgent messages.

Jane's Digital Arrest:A Lesson in Phone Scam Awareness
Jane experiences a dramatic phone scam (vishing), highlighting the risks of digital arrest scams.

The Mysterious Link:A Short Trip to Trouble
Bob encounters shortened-link phishing (SmartLinks) on LinkedIn, highlighting the dangers of clicking without verification.

A Smishing Adventure
Bob falls victim to SMS-based phishing (smishing), demonstrating the risks of trusting suspicious text messages.

Jane's Cybersecurity Chronicles:The New Threat Called Quishing
QR codes as phishing vectors explored through Jane's humorous yet cautionary story
Malware

Finders Keepers? More Like Finders Weepers!
Dangers of unknown USB drives humorously illustrated through Richard's experience.

Ransomware:Because Hackers Don't Do Free Trials!
Jane learns how ransomware can lock critical data and demand payment, highlighting protective measures.

Free Protection? More Like Free Trouble!
Free antivirus scams and malware, vividly illustrated through Bob's adventures

The Update Dilemma:Why System Updates Matter
Importance of timely software updates depicted humorously through Bob and Jane's update saga.

Secure Downloads:Bob's Digital Misadventure
Risks associated with downloading unauthorized files, illustrated through Bob's movie mishap.
Data Classification

Label It or Lose It – Bob Learns the Hard Way!
The importance of classifying and protecting information based on sensitivity, humorously depicted through Bob.
Incident Reporting

The Responsibility of Reporting:Security Incident Awareness
Importance of promptly reporting incidents, through comedic scenarios involving Bob, Jane, and Richard.
Privacy & Data Protection

Free Cloud Fiasco – Unapproved Cloud Storage
Dangers of unauthorized cloud services demonstrated by Bob's significant security breach.

Richard's Vendor Dilemma: The NDA Balancing Act
Importance of NDAs in vendor engagements shown through Richard's humorous yet insightful scenario.

Teamwork:The Smart Way to Share Documents
Secure document-sharing practices demonstrated in a funny yet informative team scenario.

The Print Out Predicament
Risks of unattended confidential printouts highlighted through Richard's amusing office adventure.

Bob's Big Broadcast:The Email That Overshared
Bob humorously showcases the perils of carelessly sending bulk emails without verifying recipients and attachments.

Richard and His Beloved Hard Drive: A Heartbreaking Backup Story
Richard discovers the security risks associated with external storage devices after misplacing sensitive company data.
Physical Security

Clean Desk Policy:
More Than Just Wiping Away Dust!
Understand the importance of securing sensitive information physically, beyond just tidying the desk.

The Dinner,
The Dash, and the Laptop Panic!
Bob highlights the risks associated with leaving company laptops unattended while traveling or in public areas.

Gentleman in Crisis:
Bob vs. The Endless Queue!
Humorous insights on how politeness can lead to serious physical security breaches through tailgating.

Bob’s Wild Visitor Adventure:
Importance of Visitor Management
The necessity of strict visitor management, hilariously depicted through Bob’s chaotic visitor experience.
3rd Party Apps

Navigating the AI Wave:
Safe Use of AI Dos and Don'ts
Risks of unauthorized AI tool usage demonstrated by Richard, emphasizing safe and compliant use of AI.

Richard's Presentation Predicament:
Click Wrap Agreements
Richard learns the pitfalls of casually accepting online license agreements without reading.
Account Security

Password Pandemonium
Demonstrates the dangers of weak passwords through Bob’s humorous yet eye-opening experience.

Bob's Weekend and the
MFA Fatigue Fraud
Bob experiences how persistent authentication prompts can lead to account compromise via MFA fatigue attacks.

Bob Locks it All—But
What’s Missing? (2FA)
Importance of Two-Factor Authentication shown by Bob’s incomplete security measures.

Protect Your Mobile Devices:
A Cautionary Tale
Simple yet essential tips to safeguard mobile devices and the valuable data they contain.

Click, Crash, Chaos:
A Senior Manager’s Cyber Slip-Up
Senior managers’ account security is critical—highlighted through Bob’s hilarious yet cautionary mishap.
Remote Working

Public WiFi Perils:
Bob’s Brewing Disaster
Risks of unsecured WiFi networks humorously illustrated through Bob’s coffee-shop catastrophe

Work from Home Gone Wild
Protecting office devices at home becomes crucial in Jane’s funny yet instructional remote-work scenario

The Perils of Public
Display of Information
Risks involved with unintentionally exposing company data in public spaces, vividly depicted.

Meeting Mayhem:
Lost Control
How insecure video conferencing settings can lead to serious privacy and security embarrassments.

The Mobile Life:
Balancing Connection and Security
Strategies for securing mobile work devices without sacrificing connectivity or convenience.
Social Engineering

Bob's WhatsApp Woes:
A Cautionary Tale
Bob’s casual WhatsApp communications highlight how easily unofficial messaging can jeopardize data security.

Richard’s Over-Share Ordeal
Demonstrates the dangers of oversharing sensitive information through social media channels.

Conversation Hijack
and the Moonwalk Menace
How hijacked conversations lead to serious data breaches—wrapped in comedic missteps.

Richard's Close Call:
The Perils of Deep Fake Attacks
Introduction to the deep fake threat with Richard’s funny yet alarming incident.

A Whale of a Mistake
Pete learns how hackers target senior executives through urgent requests (whaling), leading to a humorous office disaster.

Richard’s Work-life Imbalance:
Costly Communication
The hazards of using WhatsApp for official business communications, leading to significant misunderstandings.
Phishing

Bob Tweets, Scammers Eat !
Demonstrates Angler phishing attacks, where public complaints are exploited by scammers.

The Cost of Free:
Richard’s Phishing Lesson
Richard learns the hard way that irresistible offers can be costly phishing scams.

Bob's Email Scare:
A Lesson in Online Security
Bob faces an urgent phishing email attack, emphasizing caution with unsolicited urgent messages.

Jane’s Digital Arrest:
A Lesson in Phone Scam Awareness
Jane experiences a dramatic phone scam (vishing), highlighting the risks of digital arrest scams.

The Mysterious Link:
A Short Trip to Trouble
Bob encounters shortened-link phishing (SmartLinks) on LinkedIn, highlighting the dangers of clicking without verification.

A Smishing Adventure
Bob falls victim to SMS-based phishing (smishing), demonstrating the risks of trusting suspicious text messages.

Jane’s Cybersecurity Chronicles:
The New Threat Called Quishing
QR codes as phishing vectors explored through Jane’s humorous yet cautionary story
Malware

Finders Keepers?
More Like Finders Weepers!
Dangers of unknown USB drives humorously illustrated through Richard’s experience.

Ransomware:
Because Hackers Don’t Do Free Trials!
Jane learns how ransomware can lock critical data and demand payment, highlighting protective measures.

Free Protection?
More Like Free Trouble!
Free antivirus scams and malware, vividly illustrated through Bob’s adventures

The Update Dilemma:
Why System Updates Matter
Importance of timely software updates depicted humorously through Bob and Jane’s update saga.

Secure Downloads:
Bob's Digital Misadventure
Risks associated with downloading unauthorized files, illustrated through Bob’s movie mishap.
Data Classification

Label It or Lose It –
Bob Learns the Hard Way!
The importance of classifying and protecting information based on sensitivity, humorously depicted through Bob.
Incident Reporting

The Responsibility of Reporting:
Security Incident Awareness
Importance of promptly reporting incidents, through comedic scenarios involving Bob, Jane, and Richard.
Privacy & Data Protection

Free Cloud Fiasco –
Unapproved Cloud Storage
Dangers of unauthorized cloud services demonstrated by Bob’s significant security breach.

Richard's Vendor Dilemma:
The NDA Balancing Act
Importance of NDAs in vendor engagements shown through Richard’s humorous yet insightful scenario.

Teamwork:
The Smart Way to Share Documents
Secure document-sharing practices demonstrated in a funny yet informative team scenario.

The Print Out Predicament
Risks of unattended confidential printouts highlighted through Richard’s amusing office adventure.

Bob’s Big Broadcast:
The Email That Overshared
Bob humorously showcases the perils of carelessly sending bulk emails without verifying recipients and attachments.

Richard and His Beloved Hard Drive:
A Heartbreaking Backup Story
Richard discovers the security risks associated with external storage devices after misplacing sensitive company data.
Simplified Awareness, Beyond Just Compliance
At SucceedLEARN, we prioritize awareness over mere compliance. Our FunFoSec series ensures employees engage with content naturally and willingly. Through humor and relatable scenarios, we make critical security concepts easy to understand and hard to forget.
A Different Approach to Cybersecurity Learning
- Humor-Driven Engagement: Each video combines comedy with real-life scenarios, helping retention
- Bite-sized & Accessible: Quick, memorable lessons designed for maximum engagement
- No-Hassle Deployment: Easy-to-administer, track, and report microlearnings, without the need for complicated LMS integrations.
Start Your FunFoSec Journey Today!
It’s time to step away from traditional cybersecurity training. Embrace a method that employees will love and remember. Because at FunFoSec, we believe:
“The Future of Security is Fun.”

Train your employees with our expert guidance programs and courses to create a better, safer working environment.