Data Leakage

Stop sensitive data from leaving your org.

Що ви дізнаєтесь у Data Leakage

Data Leakage — Кроки навчання

  1. Introduction

    Today, you will learn about data leakage risks and how sensitive information can be accidentally exposed through everyday business activities.

  2. Preparing for Client Meeting

    Alice is preparing for an important client call about Nexlify Solutions' new software product. She needs to access the client database using her account credentials. As she prepares, Alice writes down her account password on the whiteboard because it's been updated recently and she's not used to her new password yet. The password is now clearly visible on the whiteboard behind her desk, but Alice is not aware of that.

  3. Accessing Client Database

    Alice needs to access the company's client database to prepare for the presentation. She uses the web browser to open Nexlify Solutions' internal client database portal and signs into her account using the password she wrote on the whiteboard. This database contains sensitive client information that will be referenced during the upcoming meeting.

  4. Receiving Meeting Invitation

    Alice receives a meeting notification for the client presentation with GlobalTech Solutions, a prospective client. She's been preparing all morning and is eager to make a good impression.

  5. Joining the Video Call

    Alice joins the video meeting with GlobalTech Solutions. She positions herself at her desk, not realizing that the whiteboard with her password is clearly visible behind her. The meeting begins and everything seems to go smoothly.

  6. Successful Meeting Conclusion

    The meeting concludes with what appears to be positive results. One of the participants, Bob Stevens, asks unusually specific questions about how client data is stored. Alice finds the questions slightly unusual but confirms they have a secure database. Overall, she believes the meeting went well.

  7. Bob's Corporate Espionage

    What Alice doesn't know is that Bob Stevens was never from GlobalTech Solutions — he's a corporate spy working for CompetitorCorp. During the video call, Bob noticed Alice's password on the whiteboard behind her. He now uses it to access Nexlify Solutions' client database and downloads everything.

  8. Devastating Contract Loss

    The next day, Alice receives a shocking email from GlobalTech Solutions informing her that they have awarded their contract to CompetitorCorp instead. The competitor somehow offered terms and pricing that exactly matched GlobalTech's specific requirements.

  9. Security Breach Discovery

    Later that day, Alice receives an urgent email from Nexlify Solutions' CEO and IT security team. They have discovered during a routine security audit that the company's client database has been compromised.

  10. Devastating Realization

    Alice suddenly turns around and looks at her whiteboard, realizing with horror that she caused the security breach. Her password was visible behind her during the entire video call, allowing Bob to access the client database using her credentials.