-
Interacting with clients and service providersWhile treating customers and vendors with respect is the right thing to do, it’s also great for business. Avoid helpline complaints and negative reviews (including on job search sites) by explaining exactly what civility and respect look like when...8✨Tokens
-
Keep confidential computer stuff on your computerProtect your company's data with this helpful graphic showing your team not to take photos of what's on their work computers.2✨Tokens
-
Keep confidential computer stuff on your computer - horizontalProtect your company's data with this helpful graphic showing your team not to take photos of what's on their work computers.2✨Tokens
-
Module: Annual Refresher CourseStill stuck doing annual check-the-box training? Gross, and sorry. But hey, at least this 31-slide kit will make it 10 minutes long and actually relevant to every employee. So, you've got that going for you, which is nice. The ideal annual refresher...25✨Tokens
-
Piecing together confidential infoEmployees' social media posts can provide enough bits of a story for your foes to assemble the whole picture of your confidential info. This graphic shows how it's done.2✨Tokens
-
Privacy screens—use them!Privacy screens are vital to prevent data breaches, even if they're a little annoying. (On the upside, you can watch your favorite horror movie on the plane without terrifying the toddler next to you.)2✨Tokens
-
Shred it! (blue version)It's not hard, but it can be boring. Use this super-graphic piece to remind your team to shred confidential information—each and every time.2✨Tokens
-
Video: Careful CommunicationsGive your teams clear guidance on the do’s and don’ts of virtual communications with this short video. In less than 3 minutes, this video breaks down the top five things to consider when engaging in virtual communications: the audience, the...8✨Tokens
-
Before a merger or acquisition...Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...8✨Tokens
-
Can I use personal data for this purpose?If COVID taught us one thing, it’s that we all like a good puzzle…occasionally. But when it comes to using personal data, there should be nothing puzzling about it. This decision tree helps your employees piece together when they CAN and...8✨Tokens
-
Conference room combo - horizontalGary knows he's supposed to wipe down the whiteboard before kicking on a video call, but he got worked up talking about his Star Wars fanfic that he forgot...and now your engineering data's been leaked. Help all your Garys keep it together with these...2✨Tokens
-
Confidential? Here's how to handle it - horizontalUse this effortless graphic to remind your team how to keep your company's confidential info safe.2✨Tokens
-
Data Processing Agreement checklistEveryone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...8✨Tokens
-
Done with it? Shred it!Shredding isn't hard—we just forget to do it. Help your employees remember with this super-graphic visual.2✨Tokens
-
Information been stolen? Report it!Use this straightforward piece to remind your employees that they shouldn't hide when something goes missing, but should raise their hand immediately.2✨Tokens
-
Mark it, protect itMaking sure confidential documents stay private requires some basics. This graphic guide helps your employees keep your info from accidentally getting disclosed by promoting uniformity in marking documents confidential—making it easier to recognize...6✨Tokens
-
Piecing together confidential info - horizontalEmployees' social media posts can provide enough bits of a story for your foes to assemble the whole picture of your confidential info. This graphic shows how it's done.2✨Tokens
-
Shred it! (not trash version)Shredding keeps data from getting out there. Help your folks remember to shred and not to trash.2✨Tokens
-
Shred it! (red shredder version)This attention-getter connects protecting your confidential info with the simple command to shred.2✨Tokens
-
TMI? Let us know!Make it clear that self-reporting isn’t just OK, it’s expected. When humans handle data, there’s room for human error, so if someone on your team uncovers data they don’t need—or shouldn’t have—empower them to...2✨Tokens
-
Video: Watch out for red flags from third partiesIn this short (less than 2 minutes), targeted training video, employees will learn what to watch out for when working with third parties. We’ll explain the five main scenarios that are most likely to cultivate red flags, like working with...10✨Tokens
-
What are side letters?Packing sandwich condiments on the side reduces risk (of mushy bread, bleh!), but contract terms on the side only increases it. Use this checklist to make sure your teams don't spoil the deal! Perfectly proportioned, it starts with a short, but...8✨Tokens
-
What not to discuss during a mergerJoining forces is exciting, but jumping the gun and prematurely sharing confidential information is not (because, you know, the law). Give this infographic to your employees at the onset of a merger or acquisition so they know what convos are off limits...6✨Tokens
-
Check the markingMarks are there for a reason; this super-graphic piece reminds your employees to heed them.2✨Tokens