Cybersecurity - Human Vulnerability Assessment
Students are invited to a site/office visit(s) to see our work and create a short report on the cybersecurity vulnerabilities of our group's working environment. This can include what is being done well and what could be done better. This should be based on human behaviour . Some examples notes and questions are: Are people leaving their computers or phones unlocked or easy to take when away from their desk? How often do people access work items on their personal phone? What risks might this present? Does everybody know each other well, would people notice if someone unrecognized was present and care to report? Are there certain rooms or equipment in rooms that should have more protection or rules to access? Do staff have keycards? Are guests asked for ID? Is it easy for someone unauthorized to get into the physical site/office? What happens when people receive spam emails? Do people know who to go to and follow the office rules on receiving spam emails? Are people behind on updating their computers / phones with the latest software? We will also give you some specific information about our processes to help you find these answers. As you complete your visit feel free to ask questions - you are just a student visitor learning about the company!