Skip to main content
Filters & Sort
  • 4 ways bad guys get your password
    4 ways bad guys get your password
    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...
    8✨Tokens
  • AI: These aren’t your grandpa’s phishing scams
    AI: These aren’t your grandpa’s phishing scams
    Phishing schemes have become much more advanced and difficult to spot if you don’t know what to look for. So, educate your folks on phishing in the age of AI with this helpful infographic. This at-a-glance tool explains some of the common bait...
    8✨Tokens
  • Anatomy of a strong password
    Anatomy of a strong password
    Spot the reference to Will Smith in this visual guide for creating safe, strong, and easily remembered passwords. Everyone hates generating a super complicated password, getting a snippy email from IT that they’re overdue to change it, forgetting...
    8✨Tokens
  • Awareness campaign: AI chatbots
    Awareness campaign: AI chatbots
    Let’s be real: Your employees are already using generative AI and chatbots to boost their work.  Before they slip up and accidentally share sensitive information or breach IP protections, display these awareness materials where they’ll...
    5✨Tokens
  • Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office.

Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us before keying in a password or checking if our work is visible in the background of our virtual meeting. These signs serve as friendly reminders to your folks that even the smallest actions play a role in keeping info secure.
    Awareness Campaign: Around the workplace
    Remind your employees who’s responsible for compliance at your org (hint: EVERYONE!) with these clever signs around the office. Sometimes we forget to do some of the simplest things as we go about our days, like observing who’s around us...
    8✨Tokens
  • Away from your computer?
    Away from your computer?
    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.
    2✨Tokens
  • Data Processing Agreement checklist
    Data Processing Agreement checklist
    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...
    8✨Tokens
  • Don't get fooled by email scammers
    Don't get fooled by email scammers
    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...
    8✨Tokens
  • Get asked to click on a link?
    Get asked to click on a link?
    Spelling is hard! But also potentially a sign of fraud. This simple reminder puts sketchy web addresses on your folks' radar. 
    2✨Tokens
  • Get asked to click on a link? (job aid)
    Get asked to click on a link? (job aid)
    Scammers are complicated, but spotting when they're spoofing web domains doesn't have to be. Use this helpful piece to teach your team the basics of avoiding fraudulent payments, misplaced confidential documents, and a compromised network by knowing...
    6✨Tokens
  • Going on a business trip? (Overseas travel checklist)
    Going on a business trip? (Overseas travel checklist)
    This piece is famous for a reason! These simple to-do's prepare your international travelers how to be safe and ethical abroad, without getting mired in legal details. This checklist covers the trade control, cybersecurity, privacy, anticorruption,...
    8✨Tokens
  • Going on a trip? Protect your data!
    Going on a trip? Protect your data!
    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...
    6✨Tokens
  • How to protect our data from imposters
    How to protect our data from imposters
    Kids dressing up as police officers = super cute. Adults impersonating them to get your company’s data = just plain creepy. But do your employees know what to do if they get a strange data request? Use this infographic to highlight who scammers...
    8✨Tokens
  • Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk?

While prohibiting the use of AI might sound good, it ignores human nature to find the easiest path forward (and when has prohibition really ever worked anyway, amirite?). 

Give your employees direction with this comprehensive guide before they find themselves up a creek without a paddle. They’ll learn how to avoid disaster and why these steps are necessary. Not just that—they’ll appreciate finding clarity in the murky waters of AI ethics and you’ll know they have the right tools to get through the muck.

Wanna frame this important issue with a mini campaign? Bookend it with the We protect our data and  Notify Privacy when mistakes happen job aids.
    How to use AI Chatbots at work
    Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...
    6✨Tokens
  • Information been stolen? Report it!
    Information been stolen? Report it!
    Use this straightforward piece to remind your employees that they shouldn't hide when something goes missing, but should raise their hand immediately.
    2✨Tokens
  • Explain what insider threats are, where they come from, and what red flag behaviors your teams need to bring to your attention.
    Insider threat red flags
    Educate your employees on what insider threats are, where they come from, and some common red flag behaviors.  This infographic kicks things off with a not-so-obvious concept: that insider threats don’t necessarily come from inside the...
    8✨Tokens
  • NEW
    Educate your teams on how to spot dodgy QR codes designed to steal passwords and other sensitive information.
    Is that QR code safe?
    Everywhere you look there’s a QR code begging to be scanned, but it's not always clear what lurks behind those mysterious black and white patterns. Help your teams stay vigilant with this ingenious awareness material, which calls out red flags in...
    4✨Tokens
Fully Customizable

Easily brand and customize our training tools with a few clicks, or we can do it for you.

Flexible Usage Rights

Permanent licenses and no limit on employee count.

Strategic Support

A dedicated compliance pro to help you level up your program.

Review Your Cart Close Close
Your cart is empty Your cart is empty Your cart is empty

Product results (0)
View All Products