Display:

Cybersecurity

Job aids

  • Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool, which neatly contrasts the DOs and DON’Ts of remote working. That way, your people are crystal clear on what they need to do to protect company assets.

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • Basic Code of Conduct Obligations

    Basic Code of Conduct Obligations

    This general guide is a quick reminder (with tips!) of day-to-day things that every employee needs to know, including how each of us has responsibilities related to ethics and compliance. Meant as a refresher and thought-provoker, this piece...

    8✨
    View
  • Don't get fooled by email scammers

    Don't get fooled by email scammers

    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...

    8✨
    View
  • Get asked to click on a link? (job aid)

    Get asked to click on a link? (job aid)

    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...

    6✨
    View
  • Going on a business trip? (Overseas travel checklist)

    Going on a business trip? (Overseas travel checklist)

    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...

    8✨
    View
  • Anatomy of a strong password

    Anatomy of a strong password

    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...

    8✨
    View
  • 4 ways bad guys get your password

    4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • Foster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to do. Your folks will appreciate the context, and your leaders will appreciate your proactivity in preventing a breach.

    We protect our data

    Foster a culture of data security at your company with this infographic, which answers the “why” of data protection with four key points: it’s the law, it’s good business, our customers expect it, and it’s the right thing to...

    6✨
    View
  • Approving employee transfers?

    Approving employee transfers?

    Transfers aren’t simply logistics—they involve trade, IT, and ethics issues, too. Use this simple checklist to confirm relevant issues have been vetted before the employee is already at their new desk. Not only does this piece work across...

    8✨
    View
  • Suspect a privacy breach?

    Suspect a privacy breach?

    Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...

    8✨
    View
  • Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing specifics.

Your teams will love the easy to read format, and you’ll rest assured that every service provider your company partners with for data processing will be properly vetted. Don’t wait for a sloppy contract to ruin your day (or, let’s be honest, year). Snag this job aid ASAP.

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View
  • Kids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request?

Use this infographic to highlight who scammers are most likely to impersonate, the types of falsified documents they might use as leverage, and what details your people need to gather BEFORE contacting the Privacy Team.

    How to protect our data from imposters

    Kids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers...

    8✨
    View
  • It’s not always obvious what’s considered health information and covered by privacy laws—or who’s responsible for keeping it secure. 

That’s where this simple chart comes in. It translates the regulatory mumbo jumbo into plain language, making it crystal clear to your employees—including your info sec and finance folks—why they need to take privacy seriously and where to go with questions.

Use it as a training takeaway, routine reminder, and post it around workstations along with Handling health information? for max impact.

    Is this health information?

    It’s not always obvious what’s considered health information and covered by privacy laws—or who’s responsible for keeping it secure.  That’s where this simple chart comes in. It translates the regulatory mumbo jumbo...

    8✨
    View
  • Health information flows through many hands while treating patients and processing payment for care. Use this chart to make sure your people — including Finance, InfoSec, and managers — know the DOs and DON'Ts of securely handling patient info, proactively saving you from a major cleanup after a privacy disaster.  

Wanna take a deep dive into what’s considered “health information”? We’ve got you covered: Check out What is health information? to round out your patient privacy training.

    Handling health information?

    Health information flows through many hands while treating patients and processing payment for care. Use this chart to make sure your people — including Finance, InfoSec, and managers — know the DOs and DON'Ts of securely...

    8✨
    View
  • Departing Employee checklists

    Departing Employee checklists

    Employees departing may be routine nowadays, and that's exactly why you need these checklists. Make sure you and your teams get what you need before the employee is out the door! We created two checklists for completion—one for the employee, one...

    8✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View