1. Locking Your Phone or Computer
2. Creating Passwords
3. Sharing Passwords
4. Using Personal Devices for Work
5. Access to Shared Computers
6. Physical Security of Devices
1. Sharing Sensitive Information
2. Data Backup
3. Document & File-Sharing Tools
4. Handling Very Sensitive Data
5. Using Public Wi-Fi
6. Encrypting or Protecting Attachments
1. Recognizing Suspicious Links
2. Handling Email Attachments
3. Suspicious Phone Calls
4. Installing New Apps or Software
5. Anti-Malware or Antivirus
6. Managing Organization's Email or Social Media
1. Existence of a Security Policy
2. Security Trainings or Workshops
3. Staff Knowledge on Digital Security
4. Staff Exit or Offboarding Procedures
5. Incident Response Plan
6. Budget or Resources for Security
1. Priority of Digital Security
2. Awareness of Local Data Protection Laws
3. Checking for New Security Threats
4. Separating Personal and Work Accounts
5. Handling Financial Transactions Online
6. Secure Websites or Online Forms