How many security violations can you find?
Thank you for participating.
Know moreSeemingly insignificant acts can lead to consequences so significant in the damages they cause. The violations we saw in this video are the best examples of this.
In the first scenario, the employee leaves his desk with his laptop unlocked to join his colleague. Now the laptop and the confidential information it contained is left open for anyone to view. This could very well be the cause of a massive data breach.
In the second scenario, the employee innocently clicks a phishing link shared through email without verifying the source of the mail, putting his entire device and his data at risk. Classic phishing attack!
FInally, in the third scenario, the employee lets another colleague in the office using his ID to bypass the verification scanner without considering that they might not even have access to that particular space or floor. Authentication is taken for a toss here.
2023 Zoho Corporation Pvt. Ltd. All rights reserved.
Your request has been recorded.
Please check your inbox for further details.
Meet you soon!
That's one sysadmin's day you just made. Keep going!
Spread the love.
Send more e-cards