Episode 1
Human Error
In this story we introduce the concept of digital security linked to the correct behavior of people in a working and private environment. About 66 percent of cyber attacks occur “between the computer and the chair", that is, they do not depend on technical weaknesses in computer systems but on human error. This means that employees are an important link for protecting corporate data, digital security is therefore the responsibility of each of us. The aim of the course is to provide basic tools to increase safety, also through prudent individual behavior.
In this story, for example, we learn what can happen (and it really happens in the real world!) When we don’t take the necessary precautions in the management of work documents, which may contain valuable information…
The characters of the story
The story
Glossary
Clean Desk Policy
The clean desk policy consists in always keeping the desk clear of documents at the end of the working day, or when you move away from your desk.
Dumpster Diving
It consists of retrieving sensitive information by poking around in the garbage.
Data Classification
Data classification is the process of analysis and organization in categories based on the sensitivity of the content of the documents.
Some of the categories:
- Public information: Information that can be communicated without restrictions
- Confidential information: There is a legal obligation to protect the confidentiality of information
Remote working
Work linked to his duties in the company but which, instead of being carried out on site, is carried out by any other place, precisely "remotely". Particular attention should be paid to this type of work, both in the transfer of data on which you work, which may not be safe, and because any other location different from the company may not have the same security dynamics.
Today's lesson
Does it seem incredible what you read? Yet paper documents are a real threat to the data they contain, and “human errors” such as leaving them around or throwing them without destroying them can have serious consequences. Imagine, for example, documents containing telephone numbers, sensitive data of citizens or users of a certain service. Or, worse, printed pages on which someone has pinned their passwords to access the corporate network or an institution.
What if this information ends up in the hands of an attacker? For this reason, before printing a document, ask yourself if it is really necessary. And if the answer is yes, remember that, once printed, you will be responsible for the security of the data contained in that sheet …