Key points in this video

This video illustrates the dangers of poor physical security and improper incident response when a device is lost or stolen.

 

Video Summary:

    1. The Incident: Dave reveals that his laptop was either stolen while he was grabbing a snack or simply misplaced. He mentions turning his back for only two minutes.
    2. Security Failures:
      • Refusal to Wipe: Dave refuses to have IT remotely wipe the device because he wants to “wait a few days” to see if it turns up.
      • Disabled Software: He admits to disabling the computer’s security software because he felt it “slowed it down”.
      • Logged-in Accounts: Because his accounts remained logged in on his browser, an unauthorized person begins making purchases (including a mesh tank top) using his credentials.

Best Practices to mitigate against Device Theft:

      • Report Immediately: Call IT and change all login credentials as soon as a device is missing.
      • Enable Remote Wipe: Use features that allow data to be erased remotely to prevent identity theft.
      • Never Disable Security: Keep all security software active to protect against exploits.

SEEN THE VIDEO? NOW TAKE A QUIZ

AND GET A CERTIFICATE OF COMPLETION WHEN YOU PASS

Cybersecurity Awareness: Computer Theft

Please fill in your name and email address.
We will send you your results and a certificate of completion when you pass.

(Pass is 100%.)

1 / 3

What was the immediate consequence of Dave's accounts remaining logged in?

2 / 3

Which security feature would have likely prevented the thief from making purchases easily?

3 / 3

Why did Dave refuse to let IT perform a remote wipe of the stolen laptop?

Your score is

The average score is 98%