Display:

Handling Information

Employees Who Use Computers

  • Submitting a Timesheet?

    Submitting a Timesheet?

    Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...

    8✨
    View
  • Email Signatures

    Email Signatures

    Don't waste the chance to get your compliance message out there; use this easy guide to incorporate it with every email. You ever seen folks who have compliance team branding, with their own signatures? Those are cool. But you know what’s better?...

    10✨
    View
  • Virtual Backgrounds

    Virtual Backgrounds

    Video meetings allow you to easily conduct business and share info from wherever you are—sometimes a little too easily—but these virtual backgrounds have your back, literally! Use them to remind yourself and others to keep unrelated work docs...

    8✨
    View
  • Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool, which neatly contrasts the DOs and DON’Ts of remote working. That way, your people are crystal clear on what they need to do to protect company assets.

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • 4 ways bad guys get your password

    4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • Lock it down - poster

    Lock it down - poster

    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.

    2✨
    View
  • Can you throw it away?

    Can you throw it away?

    Use this elegant decision tree to help your people understand the ifs, whens, and hows of getting rid of documents. Keep versus shred may feel like second nature to your compliance and legal teams, but your other employees often need more guidance. This...

    8✨
    View
  • Anatomy of a strong password

    Anatomy of a strong password

    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...

    8✨
    View
  • Destroy It Securely

    Destroy It Securely

    This simple graphic instructs your team that shredding—not the trash can—is how you get rid of docs securely.

    2✨
    View
  • Don't get fooled by email scammers

    Don't get fooled by email scammers

    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...

    8✨
    View
  • Template: Visual Legal Hold

    Template: Visual Legal Hold

    Help employees easily understand their obligations when lawsuits happen. When litigation lands, it’s critical that employees know how to navigate a legal hold. Why, then, are so many of them basically unreadable mountains of legalese? Use this...

    8✨
    View
  • Found USBs = found gum

    Found USBs = found gum

    Ensure your employees are grossed out at the security risk of using an unknown USB.

    2✨
    View
  • Get asked to click on a link? (job aid)

    Get asked to click on a link? (job aid)

    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...

    6✨
    View
  • Harassment: Inappropriate Computer Usage

    Harassment: Inappropriate Computer Usage

    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful. Everyone “knows” they’re not supposed to look at dirty...

    12✨
    View
  • Information been stolen? Report it! - screensaver

    Information been stolen? Report it! - screensaver

    Use this straightforward piece to remind your employees that they shouldn't hide when something goes missing, but should raise their hand immediately.

    2✨
    View
  • Away from your computer? - poster

    Away from your computer? - poster

    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.

    2✨
    View
  • Away from your computer? - screensaver

    Away from your computer? - screensaver

    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.

    2✨
    View
  • Done with it? Shred it! - poster

    Done with it? Shred it! - poster

    Shredding isn't hard—we just forget to do it. Help your employees remember with this super-graphic visual.

    2✨
    View
  • Information been stolen? Report it! - poster

    Information been stolen? Report it! - poster

    Use this straightforward piece to remind your employees that they shouldn't hide when something goes missing, but should raise their hand immediately.

    2✨
    View
  • Keep confidential computer stuff on your computer - screensaver

    Keep confidential computer stuff on your computer - screensaver

    Protect your company's data with this helpful graphic showing your team not to take photos of what's on their work computers.

    2✨
    View
  • Privacy screens—use them! - poster

    Privacy screens—use them! - poster

    Privacy screens are vital to prevent data breaches, even if they're a little annoying. (On the upside, you can watch your favorite horror movie on the plane without terrifying the toddler next to you.)

    2✨
    View
  • Protect your password

    Protect your password

    A helpful reminder to be smart with passwords to protect company info.

    2✨
    View
  • Shred it! (not trash version)

    Shred it! (not trash version)

    Shredding keeps data from getting out there. Help your folks remember to shred and not to trash.

    2✨
    View
  • Check the document retention schedule

    Check the document retention schedule

    People forget that—even if they're finished with a document—your document-retention policy prohibits destroying it. Remind them that your company's policy gives them a handy schedule.

    2✨
    View