-
Get asked to click on a link? (job aid)Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...6✨Tokens -
Template: Visual Legal HoldHelp employees easily understand their obligations when lawsuits happen. When litigation lands, it’s critical that employees know how to navigate a legal hold. Why, then, are so many of them basically unreadable mountains of legalese? Use this...8✨Tokens -
You might need an export license (deemed exports version)This easy tool explains the completely non-intuitive concept of "deemed exports" in trade compliance. Focusing on deemed export elements that would surprise most employees, we’ve designed this piece to drive employees to seek help from compliance...8✨Tokens -
Anatomy of a strong passwordSpot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...8✨Tokens -
We compete for talentMake sure your team knows "no-hire" agreements are illegal with this graphic reminder. Based on recent DOJ antitrust litigation, this piece explains that antitrust behavior extends beyond products, services, and illegally sharing info. Instead, your...8✨Tokens -
What not to discuss during a mergerJoining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law). Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits...6✨Tokens -
Dawn Raid: How to RespondDawn Raids can be scary, but Happy Cloud knows what to do. Educate your team on how to respond when government agents come knocking. Your team shouldn’t be unprepared for a surprise visit from regulators. This piece offers some tried-and-true...6✨Tokens -
AI: These aren’t your grandpa’s phishing scamsPhishing schemes have become much more advanced and difficult to spot if you don’t know what to look for. So, educate your folks on phishing in the age of AI with this helpful infographic. This at-a-glance tool explains some of the common bait...8✨Tokens -
How to handle a personal data requestCharades is fun, but, when it comes to handling requests for personal data, the last thing you want is for employees to play guessing games. Remove the ambiguity with this nifty infographic. It reveals the types of data requests they might receive and...8✨Tokens -
Collecting sensitive personal data?Collecting consumer data is risky business. Your company needs this information to run, but your people should only be collecting what they absolutely need, and tracking those reasons. But do they know this? This nifty infographic makes sure your people...8✨Tokens -
What can I ask a candidate during the hiring process?Hiring is exciting (finally, all hands on deck!) but if anyone on the team slips up and asks the wrong question during the interview process—stormy seas are ahead! Fear not matey, because this infographic maps out what’s OK to ask, what...8✨Tokens -
Mark it, protect itMaking sure confidential documents stay private requires some basics. This graphic guide helps your employees keep your info from accidentally getting disclosed by promoting uniformity in marking documents confidential—making it easier to recognize...6✨Tokens -
Insider threat red flagsEducate your employees on what insider threats are, where they come from, and some common red flag behaviors. This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...8✨Tokens -
How to protect our data from impostersKids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers are...8✨Tokens -
We never collect sensitive personal dataCollecting data is an essential part of your business—it’s how you identify your customers and helps you tailor your products and services. But, let’s be real—collecting data is risky, so your employees need to know what is and...8✨Tokens -
Going on a trip? Protect your data!Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target hotel...6✨Tokens