Display:

Cybersecurity

  • Working remotely? Protect your data!

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • We protect our data

    We protect our data

    Foster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...

    6✨
    View
  • Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk?

While prohibiting the use of AI might sound good, it ignores human nature to find the easiest path forward (and when has prohibition really ever worked anyway, amirite?). 

Give your employees direction with this comprehensive guide before they find themselves up a creek without a paddle. They’ll learn how to avoid disaster and why these steps are necessary. Not just that—they’ll appreciate finding clarity in the murky waters of AI ethics and you’ll know they have the right tools to get through the muck.

Wanna frame this important issue with a mini campaign? Bookend it with the We protect our data and  Notify Privacy when mistakes happen job aids.

    How to use AI Chatbots at work

    Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...

    6✨
    View
  • You are responsible for what you know - horizontal

    You are responsible for what you know - horizontal

    Keep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course and Basic Code of Conduct Obligations infographic for a...

    2✨
    View
  • Notify Privacy when mistakes happen

    Notify Privacy when mistakes happen

    Being accountable and fixing mistakes yourself is great, but when it comes to privacy mishaps, there are situations where the Privacy Team needs to be looped in. This infographic explains the most common scenarios that require their helping...

    6✨
    View
  • Don't get fooled by email scammers

    Don't get fooled by email scammers

    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...

    8✨
    View
  • Video: AI Chatbots

    Video: AI Chatbots

    Your employees are eager to leverage AI Chatbots—and while having robots help us work is cool, it also poses some serious risk.  Help them understand how to use AI Chatbots without introducing a whole host of risks with this easy to digest...

    8✨
    View
  • Going on a business trip? (Overseas travel checklist)

    Going on a business trip? (Overseas travel checklist)

    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...

    8✨
    View
  • Get asked to click on a link? (job aid)

    Get asked to click on a link? (job aid)

    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...

    6✨
    View
  • 4 ways bad guys get your password

    4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • This checklist outlines everything your employees need to verify before they use ephemeral messaging apps.

    Vanishing Words: A Guide to Ephemeral Messaging

    Ephemeral messaging—aka self-destructing apps—are an easy way to send a quick status update. But, when it comes to business discussions, your employees need to know the DOs and DON’Ts of using these apps to keep your company out of hot...

    6✨
    View
  • This short, targeted training video (1:27) outlines what counts as data and WHY protecting it matters. 

It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information matters, and closes with one major way employees can keep data safe. A perfect assortment of bite-sized privacy tidbits! 

Hungry for more? Order the We protect our data, Finalizing, Submitting, or Storing Company Records?, 4 ways bad guys get your password or Working remotely? Protect your data job aids for the whole enchilada.

    Video: We protect our data

    This short, targeted training video (1:27) outlines what counts as data and WHY protecting it matters.  It starts off by offering a few examples of what data looks like based on role, goes on to explain WHY protecting this information matters, and...

    10✨
    View
  • Module: Personal Data & Privacy

    Module: Personal Data & Privacy

    You don’t expect your employees to memorize everything about privacy and personal data, but that’s the message they’ll get if you dump a ton of regulation-focused material on them. Make it clear that they just need to know the...

    15✨
    View
  • Suspect a privacy breach?

    Suspect a privacy breach?

    Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...

    8✨
    View
  • Anatomy of a strong password

    Anatomy of a strong password

    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...

    8✨
    View
  • If someone asks for your password, report it!

    If someone asks for your password, report it!

    Prepare your team to be smarter than the scammers by reminding them to never give their passwords over the phone.

    2✨
    View
  • No re-using passwords

    No re-using passwords

    Folks hate tough passwords, much less changing them, but ya gotta. This reminds your team to avoid hacking by not reusing work passwords for personal accounts.

    2✨
    View
  • These aren’t your grandpa’s phishing scams

    These aren’t your grandpa’s phishing scams

    Phishing schemes have become much more advanced and difficult to spot if you don’t know what to look for. So, educate your folks on phishing in the age of AI with this helpful infographic. This at-a-glance tool explains some of the common bait...

    8✨
    View
  • Module: Annual Refresher Course

    Module: Annual Refresher Course

    Still stuck doing annual check-the-box training? Gross, and sorry. But hey, at least this 31-slide kit will make it 10 minutes long and actually relevant to every employee. So, you've got that going for you, which is nice. The ideal annual refresher...

    25✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Data Processing Agreement checklist

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View
  • Information been stolen? Report it! - horizontal

    Information been stolen? Report it! - horizontal

    Use this straightforward piece to remind your employees that they shouldn't hide when something goes missing, but should raise their hand immediately.

    2✨
    View
  • Overseas Travel Module

    Overseas Travel Module

    Behold: a simple, immersive way to give your employees detailed guidance on overseas travel risk. It's set up to tie to other parts of your program and pairs well with our travel checklist and a nice pinot. As seen in the video tour of Design Club, this...

    15✨
    View
  • Mix it up: password guidance

    Mix it up: password guidance

    Want a smoothie? Well, here's a smooth (ay!) way to remember to set up complex passwords.

    2✨
    View