{"id":20895,"date":"2023-03-31T08:30:18","date_gmt":"2023-03-31T12:30:18","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/security-awareness-training-diy-ideas\/20895\/"},"modified":"2023-04-10T16:30:49","modified_gmt":"2023-04-10T12:30:49","slug":"security-awareness-training-diy-ideas","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/security-awareness-training-diy-ideas\/20895\/","title":{"rendered":"Info-security training \u2014 with glue and scissors"},"content":{"rendered":"<div style=\"background-color: #e5f0ec; padding: 10px 25px; margin-bottom: 10px;\">\nDisclaimer. This is the April Fools\u2019 Day blog post. The methods of \u201ccybersecurity trainings\u201d described in it are not entirely ethical, and are not universally considered acceptable. We recommend that you think twice before using them in real life and ideally obtain the consent of the team for such actions beforehand. <\/div>\n<p>When it comes to information security, the weakest link is \u2014 and always has been \u2014 humans. That\u2019s why our blogposts often advise companies to provide <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">cybersecurity trainings for employees<\/a>. Unfortunately, not all companies can afford to allocate the necessary funds for this. Another problem is that not all employees take such lessons seriously, so the knowledge they acquire often remains purely theoretical.<\/p>\n<p>The good news is that this problem can be solved without spending huge sums of money. Below are a few fun and effective ways to demonstrate to your dear colleagues the importance of information security.<\/p>\n<h2>Passwords on sticky notes and printouts<\/h2>\n<p>\nOne of the most dangerous habits that, sadly, many office employees are still guilty of is noting down passwords on scraps of paper and leaving them in public view. Even thousands of memes down the years of passwords stuck on monitors have failed to curb this practice.<\/p>\n<p>The threat here is obvious: anyone visiting the office can take out their phone and discreetly snap all sticky notes with account credentials that catch their eye. Sometimes notes with passwords accidentally go public. For example, it\u2019s <a href=\"https:\/\/www.kaspersky.com\/blog\/unusual-ways-to-leak-info\/36049\/\" target=\"_blank\" rel=\"noopener nofollow\">not uncommon<\/a> for a password to get leaked during a workplace interview or through some office photo posted on a social network.<\/p>\n<div id=\"attachment_47704\" style=\"width: 508px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-47704\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/03\/31163734\/security-awareness-training-diy-ideas-passwords.png\" alt=\"Workplace interview with a revealing backdrop\" width=\"498\" height=\"487\" class=\"size-full wp-image-47704\"><p id=\"caption-attachment-47704\" class=\"wp-caption-text\">Prince William gives an interview with login credentials pinned to the wall behind him for the Military Flight Information Publications (MilFLIP) system of the Royal Air Force<\/p><\/div>\n<p>To discourage sticky-notes lovers from resorting to scribbling their passwords on them, you will need: a pen, several sticky notes, and someone good at imitating others\u2019 handwriting; for printouts with passwords, nothing\u2019s needed besides the printer itself. Armed with these simple tools, try replacing such sticky notes at the employee\u2019s workplace \u2014 with similar but incorrect passwords. Then observe from a safe distance how the poor soul tries to log in to their account. And try not to laugh too loudly.<\/p>\n<p>Ideally, you should leave the real sticky notes in a place where the involuntary test subject will find them after a while \u2014 otherwise they may think that it was just some system glitch or something like that (a lot depends on how tech-savvy the person is, in general). And be sure to point the hapless sinner in the direction of a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">good password manager<\/a> for storing credentials the proper way.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h2>Unlocked computers<\/h2>\n<p>\nAlso dangerous is the habit of leaving one\u2019s computer unlocked when away from one\u2019s workstation. This too, unfortunately, is not uncommon. Even more unfortunately, it\u2019s extremely difficult to manage this issue at a company-wide level.<\/p>\n<p>Unlike with passwords on sticky notes, the risk here\u2019s not of accidentally leaking sensitive information, but, should a hostile visitor come to the office, the threat can be just as grave \u2014 if not more so: it wouldn\u2019t take long to infect an unlocked computer with malware. And after that, the options for attackers are far-ranging: from industrial espionage to a small but nasty <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/ransomware\/\" target=\"_blank\" rel=\"noopener\">ransomware <\/a>infection.<\/p>\n<p>Dealing with careless employees who don\u2019t lock their computers is quite easy \u2014 and also rather entertaining, and you need just your own quick wits and dexterous hands to do it. The general strategy here\u2019s very simple: wait until your colleague leaves their workstation, then do something \u201cinteresting\u201d on their unlocked computer.<\/p>\n<p>There are several proven tactics. The most effective is to write a chat message or e-mail on their behalf. For example, you might offer to buy an after-work drink for everyone in the department. Or pen a passionate e-mail. The choice is yours. Let your creative impulses run free \u2014 the wilder, the better (without overdoing it, of course).<\/p>\n<p>The second option is quick and easy: on the unlocked computer, find an <a href=\"https:\/\/www.kaspersky.com\/blog\/adult-content-privacy-security\/35315\/\" target=\"_blank\" rel=\"noopener nofollow\">interesting image<\/a> online and set it as the desktop wallpaper. The advantage here is that the victim cannot fail to miss the point: the demonstration will be literally in their face. True, the therapeutic effect may be lower due to the less public nature of the act. If you have enough time, these tactics can even be combined, and they do complement each other nicely.<\/p>\n<p>To spare the employee any more such embarrassment and to protect the company\u2019s security going forward, advise setting up automatic lockout after a short period of inactivity. And also explain what key combination to use to instantly lock the computer in one hand movement: on Windows it\u2019s [Win] + [L], and on macOS it\u2019s [Cmd] + [Ctrl] + [Q] (this information can be stuck to the screen:).<\/p>\n<h2>Unattended smartphones<\/h2>\n<p>\nAn unlocked smartphone left unattended also poses a cybersecurity risk. Sure, the chances of an attacker using it to spread ransomware over the corporate network are low. But a hostile visitor could still get hold of some useful contact details with the intention of using them for social engineering, or plant spyware on the device. In other words, there can be some very unpleasant scenarios both for the company and personally for the smartphone owner.<\/p>\n<p>In general, the training methods from the previous case apply here too: you can compose an interesting chat message or e-mail, or download a \u201cnice\u201d picture and set it as wallpaper. But there\u2019s an additional tactic for maximum effect in the minimum time: photograph something unexpected on the unattended phone. For example, a picture of you or a mutual colleague in an interesting pose (with the latter\u2019s consent, of course).<\/p>\n<p>Afterward, as before, instruct the employee to set up automatic lockout after a short period of inactivity. Since there\u2019s no need to enter a long password to unlock a smartphone nowadays (presenting a fingerprint or your face will do), this period should be very short \u2014 say, 30\u201360 seconds.<\/p>\n<h2>Abandoned passes<\/h2>\n<p>\nAnother not-so-good habit is to leave your pass unattended. For our hostile visitor, a valid pass is a real find \u2014 one that can be used to break into the company\u2019s office and gain physical access to corporate computers or documents.<\/p>\n<p>To wean careless colleagues off this dangerous habit, you will need:\n<\/p>\n<ul>\n<li>An office printer\/scanner\/copier<\/li>\n<li>A plastic card the same size as the errant pass<\/li>\n<li>Scissors<\/li>\n<li>Glue <\/li>\n<li>A little diligence<\/li>\n<\/ul>\n<p>Take the unattended pass, photocopy it, carefully cut it out, glue it to your plastic imitation pass, and insert your artistic masterpiece into the holder in place of the real pass. Put said real pass in a place where the \u201cvictim\u201d will find it later.<\/p>\n<p>If possible, try to be at the security gate when the victim tries to exit the office, and see how they explain to the guards (if you have any, of course) who they are and why they\u2019re using a forged pass.<\/p>\n<p>Note, however, that this is a rather severe form of training, which could lead to a conflict between you and the other employee. We therefore recommend it only as a last resort after all words of warning have failed.<\/p>\n<h2>Entrust the matter to professionals<\/h2>\n<p>\nOf course, the methods described above are no substitute for full-fledged cybersecurity training, if only because they cover just a handful of the potential threats. That said, if your security budget is non-existent, they provide a good starting point.<\/p>\n<p>Ideally, they should be used as bait to get employees thinking about information security, as well as to consolidate knowledge acquired during full-fledged training. To learn more, please take a look at our <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> (suitable for large companies).<\/p>\n<p><input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\"><br>\n\n<\/p>\n<div style=\"background-color: #e5f0ec; padding: 10px 25px; margin-bottom: 10px;\">\nDisclaimer. This is the April Fools\u2019 Day blog post. The methods of \u201ccybersecurity trainings\u201d described in it are not entirely ethical, and are not universally considered acceptable. We recommend that you think twice before using them in real life and ideally obtain the consent of the team for such actions beforehand. <\/div>\n","protected":false},"excerpt":{"rendered":"<p>DIY security trainings for your colleagues that are both fun (for you) and educational (for them).<\/p>\n","protected":false},"author":2726,"featured_media":20898,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[1518,519,2625,1183,187,1022,1367],"class_list":{"0":"post-20895","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-awareness","11":"tag-hacks","12":"tag-kaspersky-asap","13":"tag-leaks","14":"tag-passwords","15":"tag-risks","16":"tag-training"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/security-awareness-training-diy-ideas\/20895\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/security-awareness-training-diy-ideas\/25462\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-awareness-training-diy-ideas\/28066\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-awareness-training-diy-ideas\/25765\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-awareness-training-diy-ideas\/34962\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-awareness-training-diy-ideas\/47703\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-awareness-training-diy-ideas\/26065\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-awareness-training-diy-ideas\/31775\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-awareness-training-diy-ideas\/31460\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/awareness\/","name":"awareness"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=20895"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20895\/revisions"}],"predecessor-version":[{"id":20925,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/20895\/revisions\/20925"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/20898"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=20895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=20895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=20895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}