If employees click suspicious links, the system __________
→ could crash / could become infected
Complete:
Hackers could __________ company data.
→ steal / access / damage
Complete:
Employees mustn’t __________ confidential information online.
→ share / post / publish
Complete:
Employees don’t have to __________ every password daily.
→ change / update
Give:
one phishing sign
one recommendation
Phishing sign:
urgent message asking for personal information
Recommendation:
employees should verify suspicious emails before clicking links
Choose + justify:
If the server fails…
When the server fails…
Which sentence describes a general situation?
→ When the server fails…
Reformulate stronger advice:
“You can change your password regularly.”
You should change your password regularly.
Explain:
Why must employees protect passwords?
→ example:
Hackers could access company systems.
Explain the difference:
mustn’t
don’t have to
→ prohibition vs not necessary
Explain why weak passwords are dangerous.
Weak passwords are dangerous because hackers can guess them easily and access company accounts or confidential data.
Improve the sentence by adding:
more detail
one consequence
Sentence:
“If users share passwords, hackers access accounts.”
Example answer:
“If users share passwords, hackers can access company accounts and steal sensitive information.
Correct:
Employees should to report suspicious emails immediately.
→ Employees should report suspicious emails immediately.
Correct + justify:
Users must to follow security procedures.
→ Users must follow security procedures.
Correct:
Employees don’t has to work from the office every day.
→ Employees don’t have to work from the office every day.
Create a mini dialogue including:
warning
reaction
recommendation
consequence
A: This email looks suspicious.
B: Really? What’s wrong with it?
A: It asks for confidential information and contains a strange link. You should report it immediately or hackers could steal company data.
Create:
Use:if, because, so
Example answer:
If employees click suspicious links, the system can become infected because the email contains malware, so the IT team has to restart the servers and change passwords.
Produce:
one possibility
one danger
one recommendation
Use:
can
could
should
Example answer:
Hackers can access company accounts. Sensitive data could be stolen. Employees should change their passwords regularly.
Create:
2 company rules
2 prohibited actions
Use:
must
mustn’t
Example answer:
Employees must use strong passwords. Staff must follow company security procedures. Users mustn’t share confidential information online. Employees mustn’t open suspicious email attachments.
Create:
one obligation
one unnecessary action
one recommendation
Use:have to, don’t have to, should
Employees have to follow company security procedures. Staff don’t have to change passwords every day. Workers should report suspicious emails immediately.
Compare:
safe online behaviour
dangerous online behaviour
Include:
at least 3 comparisons
Safe online behaviour is more responsible than dangerous online behaviour. Strong passwords are safer than weak passwords. Employees who verify emails are more careful than users who click suspicious links immediately. Using two-factor authentication is more secure than using only one password.
Explain an IT incident.
Include:
Use:
Example answer:
The server crashed when too many employees tried to access the system because the network was overloaded. As a result, users couldn’t open shared files. If this problem happens again, the IT team should upgrade the servers and improve network capacity
Mini cybersecurity explanation:
Include:
suspicious activity
possible consequence
recommendation
future prevention
Must use:can, could, should
Example answer:
Employees can receive suspicious emails with dangerous links. Hackers could steal company data if users open these messages. Staff should report suspicious emails immediately. The company should also improve cybersecurity training to prevent future attacks.
Professional security briefing:
Explain:
important rules
dangerous behaviour
consequences
Must use:
must
mustn’t
should
Example answer:
Employees must protect company passwords and follow security procedures. Staff mustn’t open suspicious links or share confidential information online. Dangerous behaviour can lead to data theft and system failures. Employees should report suspicious activity immediately and change weak passwords regularly.
Explain company procedures:
Include:
obligations
flexible rules
unnecessary actions
recommendations
Employees have to follow company security rules and protect confidential information. Staff don’t have to work from the office every day because some tasks can be done remotely. Workers should communicate problems quickly and follow IT recommendations. Employees also have to use secure passwords and respect company procedures.
Give a full professional explanation about:
“Online safety in companies”
Include: one online risk, one consequence,one obligation, one recommendation, one future prevention strategy
One important online risk is phishing emails. Hackers can steal company data if employees open suspicious links. As a result, systems can become infected and confidential information may be lost. Employees have to follow security procedures and protect passwords carefully. Staff should report suspicious activity immediately. In the future, companies should improve cybersecurity training and strengthen email protection systems.