Cybersecurity

  • Basic Code of Conduct Obligations

    This general guide is a quick reminder (with tips!) of day-to-day things that every employee needs to know, including how each of us has responsibilities related to ethics and compliance. Meant as a refresher and thought-provoker, this piece...

    8✨
    View
  • 4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • Anatomy of a strong password

    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...

    8✨
    View
  • Approving employee transfers?

    Transfers aren’t simply logistics—they involve trade, IT, and ethics issues, too. Use this simple checklist to confirm relevant issues have been vetted before the employee is already at their new desk. Not only does this piece work across...

    8✨
    View
  • Departing Employee checklists

    Employees departing may be routine nowadays, and that's exactly why you need these checklists. Make sure you and your teams get what you need before the employee is out the door! We created two checklists for completion—one for the employee, one...

    8✨
    View
  • Don't get fooled by email scammers

    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...

    8✨
    View
  • Get asked to click on a link? (job aid)

    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...

    8✨
    View
  • Going on a business trip? (Overseas travel checklist)

    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...

    8✨
    View
  • Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    8✨
    View
  • Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool, which neatly contrasts the DOs and DON’Ts of remote working. That way, your people are crystal clear on what they need to do to protect company assets.

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View