If you are selected as one of our prize winners, we will notify you via e-mail in November. Below, you will find quiz answers and explanations along with another version of Richard Reckless’ workspace that includes tags for all of the items that are security breaches.
Quiz Answers and Explanations
If you see someone you do not recognize wandering about your office area, it is a good practice to ask them, “May I help you find something?”
True. Asking unescorted visitors if they require assistance serves two purposes. If the visitor has valid business with the university, your offer of assistance will be received as courteous service. But if the visitor is an office creeper, a couple of questions will almost certainly reveal them to have no legitimate reason for being in your office area.
While at work, it really does not matter where you store your valuables, provided you keep them out of sight.
False. If you are unable to keep your valuables in your immediate control, you should always lock them up. Office creepers frequently open unlocked drawers and cabinets in search of items to steal.
If you are going to store protected health information (PHI) on a computer, that machine must be both password protected and encrypted.
True. All electronic PHI must be protected by both a robust password and data encryption. Visit the Office of Information Security for additional information on this subject.
You are not required to secure PHI, employee HR information, and student information, provided your coworkers are also permitted to handle and view such information.
False. Although all of your coworkers might be permitted access and use such data, others who enter your workspace, including both visitors and other WUSM community members, will typically not have an acceptable reason to do so. Therefore, you must always secure such data while you are not using it.
It is a good practice to write down your computer passwords and store them near your computer so they will always be easily accessible.
False. You must always safeguard your computer passwords. Never write them down and never leave them near your computer where others could exploit them to access your computer and the university’s system.
Want to check your knowledge of Workspace Security? Check out the 360 image below, which includes tags of every security breach in this workspace. Click on any tag in the 360 image to see additional details.