Display:

External Communications

  • Watch out for red flags from third parties

    Watch out for red flags from third parties

    Do your employees know what to look out for when managing third parties? This piece supports their due diligence efforts by covering the five red flags they need to spot and tell you about ASAP!

    8✨
    View
  • Careful virtual communications

    Careful virtual communications

    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn.  At best: cringey embarrassing...

    8✨
    View
  • Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk?

While prohibiting the use of AI might sound good, it ignores human nature to find the easiest path forward (and when has prohibition really ever worked anyway, amirite?). 

Give your employees direction with this comprehensive guide before they find themselves up a creek without a paddle. They’ll learn how to avoid disaster and why these steps are necessary. Not just that—they’ll appreciate finding clarity in the murky waters of AI ethics and you’ll know they have the right tools to get through the muck.

Wanna frame this important issue with a mini campaign? Bookend it with the We protect our data and  Notify Privacy when mistakes happen job aids.

    How to use AI Chatbots at work

    Your employees are eager to leverage AI chatbots to boost productivity and enhance their work. But how do you balance that with cybersecurity, protecting IP, and reputational risk? While prohibiting the use of AI might sound good, it ignores human...

    6✨
    View
  • Posting on politics?

    Posting on politics?

    Help your employees navigate the implications of politics and social media without infringing on their autonomy. Folks wanting to engage in political discussions online can create serious problems for your company. Provide them with an easy flowchart to...

    6✨
    View
  • Taking an active role in politics?

    Taking an active role in politics?

    Your employees will appreciate this clear guidance on how to participate in political activities without breaking the rules. While political debates are best left to awkward family dinners—let’s face it—personal views are bound to come...

    8✨
    View
  • Don't get fooled by email scammers

    Don't get fooled by email scammers

    Successful spear phishing sounds cool, but is one of your cybersecurity team's worst nightmares. Educate your team on the biggest red flags. Using a criminal graphic to grab their attention, this tool vividly highlights the not-always-obvious signs of...

    8✨
    View
  • Video: Engaging in politics?

    Video: Engaging in politics?

    Show your teams how to engage in polite political speech with this illuminating video. In less than two minutes (1:25), it shares tips on having healthy discussions and empowers folks to switch topics or end conversations if needed.  Use this video...

    8✨
    View
  • Video: AI Chatbots

    Video: AI Chatbots

    Your employees are eager to leverage AI Chatbots—and while having robots help us work is cool, it also poses some serious risk.  Help them understand how to use AI Chatbots without introducing a whole host of risks with this easy to digest...

    8✨
    View
  • Dawn Raid: How to Respond

    Dawn Raid: How to Respond

    Dawn Raids can be scary, but Happy Cloud knows what to do. Educate your team on how to respond when government agents come knocking. Your team shouldn’t be unprepared for a surprise visit from regulators. This piece offers some tried-and-true...

    6✨
    View
  • This checklist outlines everything your employees need to verify before they use ephemeral messaging apps.

    Vanishing Words: A Guide to Ephemeral Messaging

    Ephemeral messaging—aka self-destructing apps—are an easy way to send a quick status update. But, when it comes to business discussions, your employees need to know the DOs and DON’Ts of using these apps to keep your company out of hot...

    6✨
    View
  • Video: Watch out for red flags from third parties

    Video: Watch out for red flags from third parties

    In this short, targeted training video (1:45), employees will learn what to watch out for when working with third parties. We’ll explain the five main scenarios that are most likely to cultivate red flags, like working with government officials or...

    10✨
    View
  • Module: Personal Data & Privacy

    Module: Personal Data & Privacy

    You don’t expect your employees to memorize everything about privacy and personal data, but that’s the message they’ll get if you dump a ton of regulation-focused material on them. Make it clear that they just need to know the...

    15✨
    View
  • Suspect a privacy breach?

    Suspect a privacy breach?

    Awkward silence = cringe. Awkward silence with your coworkers = just plain terrible. Help your employees avoid long pauses and staring contests with this incredibly helpful infographic. It covers everything they need to share about a potential data...

    8✨
    View
  • Piecing together confidential info - horizontal

    Piecing together confidential info - horizontal

    Employees' social media posts can provide enough bits of a story for your foes to assemble the whole picture of your confidential info. This graphic shows how it's done.

    2✨
    View
  • One post, no context - horizontal

    One post, no context - horizontal

    A quick, beautiful illustration that social media can ruin your employees' careers in one instant.

    2✨
    View
  • Has a government regulator contacted you?

    Has a government regulator contacted you?

    If a regulator reaches out, this guide explains step-by-step who is supposed to do what and when. It’s scary when someone from the government initiates contact, and scared people often don’t make rational decisions—this is an obvious...

    8✨
    View
  • Saying it online...

    Saying it online...

    This cool piece reminds your team of the need to be as mindful of what they say online—as well as off.

    2✨
    View
  • Piecing together confidential info

    Piecing together confidential info

    Employees' social media posts can provide enough bits of a story for your foes to assemble the whole picture of your confidential info. This graphic shows how it's done.

    2✨
    View
  • Who's looking at your profile?

    Who's looking at your profile?

    Folks don't realize how useful social media can be to your company's adversaries. This helpful graphic cautions them before they post online.

    2✨
    View
  • If someone asks for your password, report it!

    If someone asks for your password, report it!

    Prepare your team to be smarter than the scammers by reminding them to never give their passwords over the phone.

    2✨
    View
  • Three simple questions guide your employees through whether it’s OK to share info freely or they need an NDA before spilling the company beans.

    Do you need to get an NDA signed?

    Ever wonder if something you're about to share needs to be kept hush-hush? This handy guide is here to help! Think of it like a three-question quiz: answer yes or no, and it'll tell you if a Non-Disclosure Agreement (NDA) is needed before anyone spills...

    8✨
    View
  • Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to ease some of your anxiety...  Prepare your employees for the integration with this one-pager that carefully lists everything to do (and not to do) premerger. Share this gun-jumping infographic for extra impact.

    Before a merger or acquisition...

    Mergers and acquisitions can be both exciting and terrifying, like base jumping, that long drop on a rollercoaster, or attending a social event for us introverts. While we don’t have a remedy for that weird stomach feeling, we do have a solution to...

    8✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Data Processing Agreement checklist

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View