Skip to main content
Filters & Sort
  • Data Processing Agreement checklist
    Data Processing Agreement checklist
    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...
    8✨Tokens
  • Information been stolen? Report it!
    Information been stolen? Report it!
    Use this straightforward piece to remind your employees that they shouldn't hide when something goes missing, but should raise their hand immediately.
    2✨Tokens
  • Protect your password!
    Protect your password!
    Give your folks these simple rules to lock down their passwords—and protect your info.
    2✨Tokens
  • Away from your computer?
    Away from your computer?
    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.
    2✨Tokens
  • Privacy screens—use them!
    Privacy screens—use them!
    Privacy screens are vital to prevent data breaches, even if they're a little annoying. (On the upside, you can watch your favorite horror movie on the plane without terrifying the toddler next to you.)
    2✨Tokens
  • Get asked to click on a link?
    Get asked to click on a link?
    Spelling is hard! But also potentially a sign of fraud. This simple reminder puts sketchy web addresses on your folks' radar. 
    2✨Tokens
  • Educate your teams on how to spot dodgy QR codes designed to steal passwords and other sensitive information.
    Is that QR code safe?
    Everywhere you look there’s a QR code begging to be scanned, but it's not always clear what lurks behind those mysterious black and white patterns. Help your teams stay vigilant with this ingenious awareness material, which calls out red flags in...
    4✨Tokens
  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.
    Insider threat red flags
    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...
    8✨Tokens
  • Your employees need to collect personal data—but what they need to think through beforehand isn’t always clear. 

This video (2:14) tells your employees the 5 W’s and sometimes H of collecting personal data, why you need to have a clear business purpose, and how to handle it once they collect it.

Your employees will be happy to know exactly what to do, and you'll be glad they’re prepared.
    Video: Want to collect customer data?
    Your employees need to collect personal data—but what they need to think through beforehand isn’t always clear.  This video (less than 2 minutes) tells your employees the 5 W’s and sometimes H of collecting personal data, why you...
    10✨Tokens
  • Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office.

Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us before keying in a password or checking if our work is visible in the background of our virtual meeting. These signs serve as friendly reminders to your folks that even the smallest actions play a role in keeping info secure.
    Awareness Campaign: Around the workplace
    Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office. Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us...
    8✨Tokens
  • How to protect our data from imposters
    How to protect our data from imposters
    Kids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers are...
    8✨Tokens
  • Privacy screens—use them! - horizontal
    Privacy screens—use them! - horizontal
    Privacy screens are vital to prevent data breaches, even if they're a little annoying. (On the upside, you can watch your favorite horror movie on the plane without terrifying the toddler next to you.)
    2✨Tokens
  • Recycle paper, not passwords
    Recycle paper, not passwords
    Recycling may be great for the environment, but it's terrible for cybersecurity! Remind your team of the need to protect your data with unique passwords.
    2✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products