-
4 ways bad guys get your passwordThis is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...8✨Tokens
-
AI: These aren’t your grandpa’s phishing scamsPhishing schemes have become much more advanced and difficult to spot if you don’t know what to look for. So, educate your folks on phishing in the age of AI with this helpful infographic. This at-a-glance tool explains some of the common bait...8✨Tokens
-
All expenses must include receiptsHelp your people reviewing invoices avoid fraud or bribery by showing them what red flags look like—they'll love you for it! Use these graphics alongside our other invoice red flag pieces for a strategic campaign tackling this compliance priority.2✨Tokens
-
Anatomy of a strong passwordSpot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...8✨Tokens
-
Are you on the restricted list?An easy reminder: you may have to get permission to trade stocks, so ask.2✨Tokens
-
Assessing Conflicts of InterestThis helpful one-pager gives HR professionals an easy way to assess whether a business decision raises red flags due to a conflict of interest. This off-the-shelf version guides them through both relationships and financial interests that may create a...8✨Tokens
-
Awareness campaign: AI chatbotsLet’s be real: Your employees are already using generative AI and chatbots to boost their work. Before they slip up and accidentally share sensitive information or breach IP protections, display these awareness materials where they’ll...5✨Tokens
-
Awareness Campaign: Around the workplaceRemind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office. Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us...8✨Tokens
-
Away from your computer?Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.2✨Tokens
-
Away from your computer? - horizontalMake sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.2✨Tokens
-
Before a merger or acquisition...Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...8✨Tokens
-
Before you post (even privately) about work on social mediaNavigating social media gets more complicated by the day. This simple checklist helps your employees quickly assess whether to post about work. It doesn’t take more than a few seconds for one of your employees to expose your company to reputation...6✨Tokens
-
Broadcat Icon System: Entities and Information PackNeed a way to represent different entities—like a government organization or healthcare facility—or describe how to handle confidential information or IP? You're in luck! With this icon pack, you’ll be able to illustrate concepts...8✨Tokens
-
Can I use personal data for this purpose?If COVID taught us one thing, it’s that we all like a good puzzle…occasionally. But when it comes to using personal data, there should be nothing puzzling about it. This decision tree helps your employees piece together when they CAN and...8✨Tokens
-
Can you throw it away?Use this elegant decision tree to help your people understand the ifs, whens, and hows of getting rid of documents. Keep versus shred may feel like second nature to your compliance and legal teams, but your other employees often need more guidance. This...8✨Tokens
-
Careful virtual communicationsWe may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn. At best: cringey embarrassing...8✨Tokens
-
Careful virtual communications (mini-module)Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. In seven brief slides, this deck gives your employees everything they need to...8✨Tokens
-
Check before you collect personal dataCollecting customer information is easy. Making sure your employees know if it’s legal might not be. This sleek awareness piece reminds your employees to make sure it’s OK before they collect or start using it for a project.2✨Tokens
-
Check the background before you share itEncourage your team to avoid inadvertently posting photos with your company's confidential info.2✨Tokens
-
Check the background before you share it - horizontalEncourage your team to avoid inadvertently posting photos with your company's confidential info.2✨Tokens
-
Check the document retention schedulePeople forget that—even if they're finished with a document—your document-retention policy prohibits destroying it. Remind them that your company's policy gives them a handy schedule.2✨Tokens
-
Check the markingMarks are there for a reason; this super-graphic piece reminds your employees to heed them.2✨Tokens
-
Check the marking - horizontalMarks are there for a reason; this super-graphic piece reminds your employees to heed them.2✨Tokens
-
Click smart!Keep your team thinking about safe web use.2✨Tokens