Skip to main content
Filters & Sort
  • 4 ways bad guys get your password
    4 ways bad guys get your password
    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...
    8✨Tokens
  • AI: These aren’t your grandpa’s phishing scams
    AI: These aren’t your grandpa’s phishing scams
    Phishing schemes have become much more advanced and difficult to spot if you don’t know what to look for. So, educate your folks on phishing in the age of AI with this helpful infographic. This at-a-glance tool explains some of the common bait...
    8✨Tokens
  • All expenses must include receipts
    All expenses must include receipts
    Help your people reviewing invoices avoid fraud or bribery by showing them what red flags look like—they'll love you for it! Use these graphics alongside our other invoice red flag pieces for a strategic campaign tackling this compliance priority.
    2✨Tokens
  • Anatomy of a strong password
    Anatomy of a strong password
    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...
    8✨Tokens
  • Assessing Conflicts of Interest
    Assessing Conflicts of Interest
    This helpful one-pager gives HR professionals an easy way to assess whether a business decision raises red flags due to a conflict of interest. This off-the-shelf version guides them through both relationships and financial interests that may create a...
    8✨Tokens
  • Awareness campaign: AI chatbots
    Awareness campaign: AI chatbots
    Let’s be real: Your employees are already using generative AI and chatbots to boost their work.  Before they slip up and accidentally share sensitive information or breach IP protections, display these awareness materials where they’ll...
    5✨Tokens
  • Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office.

Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us before keying in a password or checking if our work is visible in the background of our virtual meeting. These signs serve as friendly reminders to your folks that even the smallest actions play a role in keeping info secure.
    Awareness Campaign: Around the workplace
    Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office. Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us...
    8✨Tokens
  • Away from your computer?
    Away from your computer?
    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.
    2✨Tokens
  • Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to ease some of your anxiety...  Prepare your employees for the integration with this one-pager that carefully lists everything to do (and not to do) premerger. Share this gun-jumping infographic for extra impact.
    Before a merger or acquisition...
    Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...
    8✨Tokens
  • Before you post (even privately) about work on social media Before you post (even privately) about work on social media
    Before you post (even privately) about work on social media
    Navigating social media gets more complicated by the day. This simple checklist helps your employees quickly assess whether to post about work. It doesn’t take more than a few seconds for one of your employees to expose your company to reputation...
    6✨Tokens
  • Broadcat Icon System: Entities and Information Pack Broadcat Icon System: Entities and Information Pack Broadcat Icon System: Entities and Information Pack Broadcat Icon System: Entities and Information Pack
    Broadcat Icon System: Entities and Information Pack
    Need a way to represent different entities—like a government organization or healthcare facility—or describe how to handle confidential information or IP? You're in luck!  With this icon pack, you’ll be able to illustrate concepts...
    8✨Tokens
  • Can I use personal data for this purpose?
    Can I use personal data for this purpose?
    If COVID taught us one thing, it’s that we all like a good puzzle…occasionally. But when it comes to using personal data, there should be nothing puzzling about it. This decision tree helps your employees piece together when they CAN and...
    8✨Tokens
  • Can you throw it away?
    Can you throw it away?
    Use this elegant decision tree to help your people understand the ifs, whens, and hows of getting rid of documents. Keep versus shred may feel like second nature to your compliance and legal teams, but your other employees often need more guidance. This...
    8✨Tokens
  • Careful virtual communications
    Careful virtual communications
    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn.  At best: cringey embarrassing...
    8✨Tokens
  • Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. 

In seven brief slides, this deck gives your employees everything they need to consider about communicating virtually BEFORE clicking send, like who’s the audience, thinking through what to say, and considering the timing and tone. 

Make this info really sticky by adding this to our Annual Refresher Course or pairing it with our Careful virtual communications job aid. Careful virtual communications (mini-module) Careful virtual communications (mini-module) Careful virtual communications (mini-module)
    Careful virtual communications (mini-module)
    Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy.  In seven brief slides, this deck gives your employees everything they need to...
    8✨Tokens
  • Check before you collect personal data
    Check before you collect personal data
    Collecting customer information is easy. Making sure your employees know if it’s legal might not be. This sleek awareness piece reminds your employees to make sure it’s OK before they collect or start using it for a project.
    2✨Tokens
  • Check the document retention schedule
    Check the document retention schedule
    People forget that—even if they're finished with a document—your document-retention policy prohibits destroying it. Remind them that your company's policy gives them a handy schedule.
    2✨Tokens
  • Check the marking
    Check the marking
    Marks are there for a reason; this super-graphic piece reminds your employees to heed them.
    2✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products