-
Insider threat red flagsEducate your employees on what insider threats are, where they come from, and some common red flag behaviors. This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...
Log in for pricing
-
Third Party Code of Conduct TrainingYour third parties—like vendors, consultants, suppliers, and business partners—are essentially an extension of your org, so they need to know and uphold your standards. Share this practical module with them to make sure they get it. In about...
Log in for pricing
-
Vanishing Words: A Guide to Ephemeral MessagingEphemeral messaging—aka self-destructing apps—are an easy way to send a quick status update. But, when it comes to business discussions, your employees need to know the DOs and DON’Ts of using these apps to keep your company out of hot...
Log in for pricing
-
Awareness campaign: AI chatbotsLet’s be real: Your employees are already using generative AI and chatbots to boost their work. Before they slip up and accidentally share sensitive information or breach IP protections, display these awareness materials where they’ll...
Log in for pricing
-
AI: These aren’t your grandpa’s phishing scamsPhishing schemes have become much more advanced and difficult to spot if you don’t know what to look for. So, educate your folks on phishing in the age of AI with this helpful infographic. This at-a-glance tool explains some of the common bait...
Log in for pricing
-
Video: AI ChatbotsYour employees are eager to leverage AI Chatbots—and while having robots help us work is cool, it also poses some serious risk. Help them understand how to use AI Chatbots without introducing a whole host of risks with this easy to digest...
Log in for pricing
-
Video: When should I contact the Privacy team?Do the folks at your org ever feel like what the Privacy Team needs to know is kept too… private? Get the word out about exactly when to contact them with this short video. In less than 1.5 minutes, your teams will understand the info- and...
Log in for pricing
-
Video: Want to collect customer data?Your employees need to collect personal data—but what they need to think through beforehand isn’t always clear. This video (less than 2 minutes) tells your employees the 5 W’s and sometimes H of collecting personal data, why you...
Log in for pricing
-
Awareness Campaign: Around the workplaceRemind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office. Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us...
Log in for pricing
-
Video: We protect our dataThis short, targeted training video (roughly 90 seconds) outlines what counts as data and WHY protecting it matters. It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information...
Log in for pricing
-
Module: Annual Refresher CourseStill stuck doing annual check-the-box training? Gross, and sorry. But hey, at least this 31-slide kit will make it 10 minutes long and actually relevant to every employee. So, you've got that going for you, which is nice. The ideal annual refresher...
Log in for pricing
-
How to use AI Chatbots at workYour employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...
Log in for pricing
-
Module: Personal Data & PrivacyYou don’t expect your employees to memorize everything about privacy and personal data, but that’s the message they’ll get if you dump a ton of regulation-focused material on them. Make it clear that they just need to know the...
Log in for pricing
-
Suspect a privacy breach?Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...
Log in for pricing
-
Received a request to transfer data?What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...
Log in for pricing
-
We protect our dataFoster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...
Log in for pricing
-
Notify Privacy when mistakes happenBeing accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...
Log in for pricing
-
Data Processing Agreement checklistEveryone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...
Log in for pricing
-
How to protect our data from impostersKids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers...
Log in for pricing
-
Working remotely? Protect your data!Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...
Log in for pricing
-
Information been stolen? Report it! - horizontalUse this straightforward piece to remind your employees that they shouldn't hide when something goes missing, but should raise their hand immediately.
Log in for pricing
-
Away from your computer? - horizontalMake sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.
Log in for pricing
-
Privacy screens—use them! - horizontalPrivacy screens are vital to prevent data breaches, even if they're a little annoying. (On the upside, you can watch your favorite horror movie on the plane without terrifying the toddler next to you.)
Log in for pricing
-
Recycle paper, not passwords - horizontalRecycling may be great for the environment, but it's terrible for cybersecurity! Remind your team of the need to protect your data with unique passwords.
Log in for pricing