Skip to main content
Broadcat

Broadcat

Filters & Sort
  • Working remotely? Protect your data!
    Working remotely? Protect your data!
    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks...
    8✨Tokens
  • Careful virtual communications
    Careful virtual communications
    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a...
    8✨Tokens
  • Can you throw it away?
    Can you throw it away?
    Use this elegant decision tree to help your people understand the ifs, whens, and hows of getting rid of documents. Keep versus shred may feel like second nature to your compliance and legal teams,...
    8✨Tokens
  • Don't get fooled by email scammers
    Don't get fooled by email scammers
    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this...
    8✨Tokens
  • Email Signatures Email Signatures
    Email Signatures
    Don't waste the chance to get your compliance message out there; use this easy guide to incorporate it with every email. You ever seen folks who have compliance team branding, with their own...
    10✨Tokens
  • Video: AI Chatbots
    Video: AI Chatbots
    Your employees are eager to leverage AI Chatbots—and while having robots help us work is cool, it also poses some serious risk.  Help them understand how to use AI Chatbots without...
    8✨Tokens
  • Get asked to click on a link? (job aid)
    Get asked to click on a link? (job aid)
    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced...
    6✨Tokens
  • Template: Visual Legal Hold
    Template: Visual Legal Hold
    Help employees easily understand their obligations when lawsuits happen. When litigation lands, it’s critical that employees know how to navigate a legal hold. Why, then, are so many of them...
    8✨Tokens
  • 4 ways bad guys get your password
    4 ways bad guys get your password
    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your...
    8✨Tokens
  • Check the document retention schedule
    Check the document retention schedule
    People forget that—even if they're finished with a document—your document-retention policy prohibits destroying it. Remind them that your company's policy gives them a handy schedule.
    2✨Tokens
  • Equip your teams with the strategic soft skills they need to engage in tough conversations with this short contrasting-examples video (2:15).
    Video: Careful Communications
    Give your teams clear guidance on the do’s and don’ts of virtual communications with this short video. In less than 3 minutes, this video breaks down the top five things to consider when...
    8✨Tokens
  • Conference room combo - horizontal
    Conference room combo - horizontal
    Gary knows he's supposed to wipe down the whiteboard before kicking on a video call, but he got worked up talking about his Star Wars fanfic that he forgot...and now your engineering data's been...
    2✨Tokens
  • Virtual Backgrounds Virtual Backgrounds
    Virtual Backgrounds
    Video meetings allow you to easily conduct business and share info from wherever you are—sometimes a little too easily—but these virtual backgrounds have your back, literally! Use them to...
    8✨Tokens
  • Email signatures (CDC Guidelines)
    Email signatures (CDC Guidelines)
    Keeping your employees healthy and safe is a top priority. We know changing routines and behaviors isn’t a small feat—especially remote workers’ habits— so use these to snazz...
    0✨Tokens
  • Anatomy of a strong password
    Anatomy of a strong password
    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from...
    8✨Tokens
  • No re-using passwords
    No re-using passwords
    Folks hate tough passwords, much less changing them, but ya gotta. This reminds your team to avoid hacking by not reusing work passwords for personal accounts.
    2✨Tokens
  • Destroy It Securely
    Destroy It Securely
    This simple graphic instructs your team that shredding—not the trash can—is how you get rid of docs securely.
    2✨Tokens
  • Awareness campaign: AI chatbots
    Awareness campaign: AI chatbots
    Let’s be real: Your employees are already using generative AI and chatbots to boost their work.  Before they slip up and accidentally share sensitive information or breach IP protections,...
    5✨Tokens
  • Email Headers Email Headers Email Headers Email Headers
    Email Headers
    Captain Obvious says, “if you want people to read your stuff, you have to get them to look at it first.” But that’s tough when you’re competing with overstuffed inboxes,...
    10✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products