Skip to main content
Filters & Sort
  • Working remotely? Protect your data!
    Working remotely? Protect your data!
    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...
    8✨Tokens
  • You are responsible for what you know - horizontal
    You are responsible for what you know - horizontal
    Keep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course and Basic Code of Conduct Obligations infographic for a...
    2✨Tokens
  • Don't get fooled by email scammers
    Don't get fooled by email scammers
    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...
    8✨Tokens
  • Going on a business trip? (Overseas travel checklist)
    Going on a business trip? (Overseas travel checklist)
    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...
    8✨Tokens
  • Get asked to click on a link? (job aid)
    Get asked to click on a link? (job aid)
    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...
    6✨Tokens
  • 4 ways bad guys get your password
    4 ways bad guys get your password
    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...
    8✨Tokens
  • Anatomy of a strong password
    Anatomy of a strong password
    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...
    8✨Tokens
  • No re-using passwords
    No re-using passwords
    Folks hate tough passwords, much less changing them, but ya gotta. This reminds your team to avoid hacking by not reusing work passwords for personal accounts.
    2✨Tokens
  • Overseas Travel Module Overseas Travel Module Overseas Travel Module Overseas Travel Module
    Overseas Travel Module
    Behold: a simple, immersive way to give your employees detailed guidance on overseas travel risk. It's set up to tie to other parts of your program and pairs well with our travel checklist and a nice pinot. As seen in the video tour of Design Club, this...
    15✨Tokens
  • Protect your password!
    Protect your password!
    Give your folks these simple rules to lock down their passwords—and protect your info.
    2✨Tokens
  • Away from your computer?
    Away from your computer?
    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.
    2✨Tokens
  • Get asked to click on a link?
    Get asked to click on a link?
    Spelling is hard! But also potentially a sign of fraud. This simple reminder puts sketchy web addresses on your folks' radar. 
    2✨Tokens
  • Privacy screens—use them! - horizontal
    Privacy screens—use them! - horizontal
    Privacy screens are vital to prevent data breaches, even if they're a little annoying. (On the upside, you can watch your favorite horror movie on the plane without terrifying the toddler next to you.)
    2✨Tokens
  • Recycle paper, not passwords
    Recycle paper, not passwords
    Recycling may be great for the environment, but it's terrible for cybersecurity! Remind your team of the need to protect your data with unique passwords.
    2✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products