How Big a Risk to Information Security do you Pose to your Organization? Take the fun quiz here to find out.
Each week the local, national and international news report significant incidents where information has been lost due to seemingly casual incidents of carelessness. For example, the loss of portable devices such as memory sticks, mobile phones, tablets and laptops. Although we fear digital threats to data security or the risk of devices being stolen, the greatest threats to information security include leaving devices unattended or forgetting them.
Organizations are increasing data security by implementing information technology and information systems to maintain centralized data storage and data access through corporate information systems. This reduces the need for staff to store data locally on personal desktop computers or personal mobile devices. However, limitations of corporate systems such as processing and network speeds are a cause frustration, encouraging staff to store local copies of data.
In addition, the ability and pressure to work outside normal work hours and away from the organizational environment offers many advantages and disadvantages. For example, an employee may plan to complete a report when they get home in the evening. The employee may be able to gain remote access to the data they need stored in organizational information systems via their home Internet connection. However, there is always a risk that the Internet connection or external systems may not be available due to unforeseen circumstances. The simplest solution is therefore to take a copy of the data home to work on which can then be uploaded to corporate systems the next day. Many people adopt this approach every day but in removing data from the organization’s premises, the data are being put at risk and the organization’s data security policies may be being breached.
Take the following test to find out how big a potential security risk you pose to your organization.
How Big a Risk to Information Security do you Pose to your Organization?
0 of 10 questions completed
This is a fun quiz to highlight potential risks to the organization’s data.
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Time has elapsed
You have reached 0 of 0 points, (0)
So are you putting your organization’s data at risk?
If you scored: 1-3 You are a Low Risk.
Congratulations, you are very security conscious, but do not get complacent. Remember to think about the data that can be stored and accessed from your portable devices.
If you scored: 4-6 You are an Average Risk.
Not bad, you are not a HUGE security risk but you do need to think carefully about the data that can be stored and accessed from your portable devices. Make sure passwords are used and that you control access to your portable devices
If you scored: 7-10 You are a High Risk.
The potential risks of a data breach are high. Think about your portable device as being a master key providing access to all your organization’s premises, departments and computer systems. Keep them safe!
Question 1 of 10
Have you read your organization’s policy on removing data from the organization’s premises?
Question 2 of 10
Do you download organizational data to a memory stick, tablet computer or laptop?
Question 3 of 10
Do you use any portable devices (e.g. mobile phones, tablet computer or laptop) to access data stored in organizational information systems?
Question 4 of 10
Do you have passwords or pass codes on all the portable devices from which you can access organizational information systems?
Question 5 of 10
Do you access your organizational email using a portable device provided by the organization?
Question 6 of 10
Do you access your organizational email using a portable device that you own (that has not been provided by the organization)?
Question 7 of 10
Do you travel to and from work using public transport?
Question 8 of 10
Do other members of your household use your portable devices?
Question 9 of 10
Do you use portable devices owned by members of your household to access organizational data?
Question 10 of 10
Do you ever leave your mobile phone or portable device unattended in a public place?
Further Reading: data security is discussed in Chapter 5.
Please use the following to reference this blog post in your own work:
Cox, S. A., (2014), ‘Are You an Information Security Risk?’, 18 July 2014, http://www.managinginformation.org/information-security-risk/, [Date accessed: dd:mm:yy]