A specialized tool that is used with a web browser to remember all the different usernames and passwords for all the various sites
Password Management
Being mindful of surroundings, tasks, and the potential consequences of one’s actions
Situational Awareness
A manipulative tactic used by attacker to trick individuals into bypassing an organization’s security procedures
Social Engineering
An attacker may seek to look over one’s shoulder to try to view any sensitive data on one’s screen
Shoulder Surfing
An attacker tries to listen to private conversations or meetings to breach security
Eavesdropping
An unauthorized individual closely follows someone with legitimate access to slip into secure premises
Piggybacking/Tailgating
An attacker scours trash for discarded data to build a comprehensive profile of confidential information.
Dumpster Diving
Stresses data protection against social engineers for business aspects such as routines project details, and internal procedures
OPSEC
System of rules that guides decisions and actions to ensure compliance with organizational standards and legal ethics.
Policy
Concise booklet offering detailed guidance on organization-specific procedures, guidelines, and best practices for individuals
Handbook
A work setup in which the employees work from locations outside a traditional office
Remote Work
Combination of traditional office settings with remote
Hybrid Work
Recognizing the human role in security, ensuring staff engagement, and plolicy adherence
Organizational Change Management