From the official Exchange Certification curriculum:
Protecting Information

There are three key elements to protecting information:

Confidentiality: Protecting information from unauthorized disclosure to people or processes.

In addition to protecting your computer and related systems, it is critical that you protect various media forms as well ...  
Protect Your Area - Recognize, politely challenge, and assist people who do not belong in the work area to avoid potential security attacks, such as "Shoulder Surfing" or "Social Engineering".

Arrange Workstations so that the computer screen is not visible to individuals standing at a door or when first entering the room (e.g., "Shoulder Surfing"). Utilize privacy filter screens as necessary. [emphasis added]
And now here's Ms Shecantbeserious & Friends crashing a sign-up (courtesy of the Free Beacon):



Leaving aside the (unsurprising at this point) HC.gov site crash, notice anything else, um, amiss?

0 comments :

Post a Comment

 
Top