Display:

Use of Company Assets

Employees Who Use Computers

  • Working remotely? Protect your data!

    Working remotely? Protect your data!

    Your employees likely work on the go—from hotels, airports, home, bathroom stalls (hey, we don’t judge!)—which invites increased cybersecurity, privacy, and confidentiality risks. Kick your worries to the curb by giving them this tool,...

    8✨
    View
  • Careful virtual communications

    Careful virtual communications

    We may love dishing about juicy binge-worthy shows on Slack, but it’s easy to forget that these types of communications are on company record, which can lead to problems if discussions take a sensitive turn.  At best: cringey embarrassing...

    8✨
    View
  • You are responsible for what you know - horizontal

    You are responsible for what you know - horizontal

    Keep your Code of Conduct top-of-mind and aligned with everyday tasks with this graphic. Even better? It's part of an entire system: use it with our Annual Refresher Course and Basic Code of Conduct Obligations infographic for a...

    2✨
    View
  • 4 ways bad guys get your password

    4 ways bad guys get your password

    This is an effective, practical instructor for your employees to keep their passwords—and your company's data—private. We list out the most popular means the crooks use to hack your team’s passwords using fun graphics that help...

    8✨
    View
  • Lock it down

    Lock it down

    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.

    2✨
    View
  • Away from your computer?

    Away from your computer?

    Make sure your team always remembers: an open computer, left alone, is a privacy breach waiting to happen.

    2✨
    View
  • Equip your teams with the strategic soft skills they need to engage in tough conversations with this short contrasting-examples video (2:15).

    Video: Careful Communications

    Give your teams clear guidance on the do’s and don’ts of virtual communications with this short video (2:15). In less than 3 minutes, this video breaks down the top five things to consider when engaging in virtual communications: the...

    8✨
    View
  • Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy. 

In seven brief slides, this deck gives your employees everything they need to consider about communicating virtually BEFORE clicking send, like who’s the audience, thinking through what to say, and considering the timing and tone. 

Make this info really sticky by adding this to our Annual Refresher Course or pairing it with our Careful virtual communications job aid.

    Careful virtual communications (mini-module)

    Virtual communication has tons of advantages like convenience and efficiency. But along with these pros come disadvantages like misinterpretation and lack of privacy.  In seven brief slides, this deck gives your employees everything they need to...

    8✨
    View
  • No inappropriate websites at work (phone version) - horizontal

    No inappropriate websites at work (phone version) - horizontal

    Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...

    2✨
    View
  • No inappropriate websites at work (phone version)

    No inappropriate websites at work (phone version)

    Everyone “knows” they’re not supposed to look at dirty pictures at work—it’s just that they think they can get away with it and it doesn’t impact anyone else. This graphic encourages bystanders (or, here, you know,...

    2✨
    View
  • No inappropriate websites at work (desk version) - horizontal

    No inappropriate websites at work (desk version) - horizontal

    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful.

    2✨
    View
  • No inappropriate websites at work (desk version)

    No inappropriate websites at work (desk version)

    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful.

    2✨
    View
  • Submitting a Timesheet?

    Submitting a Timesheet?

    Getting creative at work is usually a good thing, but not when it comes to timekeeping. Incorporate this checklist into the time tracking process, so both your hourly employees and managers are crystal clear on the rules. This way, small adjustments can...

    8✨
    View
  • Lock it down - horizontal

    Lock it down - horizontal

    This simple graphic shows your folks three easy-but-necessary ways to protect your stuff from intruders.

    2✨
    View
  • Harassment: Cyberbullying

    Harassment: Cyberbullying

    “Stop being a jerk on Facebook, Caitlyn.” But like, in a fun campaign format. Using collateral you can print in multiple formats (screensavers, posters, mousepads, and coasters), this campaign drives home the simple message that your company...

    12✨
    View
  • Harassment: Inappropriate Computer Usage

    Harassment: Inappropriate Computer Usage

    No matter how hard IT tries, you can't block all the porn. Use this messaging to remind people that looking at dirty stuff at work is insanely inappropriate and disrespectful. Everyone “knows” they’re not supposed to look at dirty...

    12✨
    View
  • Protect your password!

    Protect your password!

    Give your folks these simple rules to lock down their passwords—and protect your info.

    2✨
    View
  • Laptop get swiped? Report it!

    Laptop get swiped? Report it!

    Make sure your folks know that when their tech is stolen, call the company—now.

    2✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View