Course Content
Cybersecurity Awareness for Corporate Teams

3.2 Safe Device & Network Usage

Secure behavior extends beyond passwords. Everyday device and network usage decisions
can significantly reduce or increase organizational risk.

    • Public Wi-Fi Risks:
      Unsecured wireless networks expose users to multiple attack vectors.
      • Man-in-the-Middle (MitM):
        Attackers position themselves between your device and the router,
        silently intercepting or altering transmitted data.
      • Evil Twin:
        A fake wireless network (e.g., Starbucks_Free_WiFi)
        created by an attacker to lure unsuspecting users.
      • Defense:
        Always use a VPN (Virtual Private Network),
        which creates an encrypted tunnel protecting your data on untrusted networks.

  • Physical Security:
    Many cyber incidents begin with physical access failures.
    • Tailgating:
      An attacker follows an employee into a restricted area.
      Politeness can be a vulnerability—do not hold secure doors
      open for unknown individuals.
    • USB Drop Attacks:
      Malicious USB drives labeled
      “Payroll 2025” or “Executive Salaries”
      are left in public areas. Curiosity leads users to plug them in,
      resulting in system compromise.