A laptop being Stolen
|
|
|
|
|
|
|
|
You providing corporate data to a cyber criminal
|
|
|
|
|
|
|
|
You clicking a malicious link in an email
|
|
|
|
|
|
|
|
You connecting to free WiFi whilst out of the office
|
|
|
|
|
|
|
|
Plugging a USB flash drive into your computer that you have found on the ground
|
|
|
|
|
|
|
|
Using a home computer to do work
|
|
|
|
|
|
|
|
Using the same password on your social media accounts and work accounts
|
|
|
|
|
|
|
|