Want to create interactive content? It’s easy in Genially!

Get started free

PREVENTION

Bhupender Singh

Created on August 18, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Science Breakout

Mystery Breakout

Musical Room Escape

Submarine Escape Game

Earth Day Escape Room

Corporate Escape Room: Operation Christmas

Witchcraft Escape Room

Transcript

PREVENTION

start

Disclaimer

The videos in the ESCAPE project were developed using a combination of digital and automated creative tools (AI). As a result, some visual elements may vary between videos. In particular, the appearance of characters, including their uniforms, physical features, and overall presentation, may not accurately reflect the typical appearance of care or health workers in your home country or local context. These variations are a technical result of the AI tools used in the production process and do not affect the educational content or objectives of the ESCAPE project.

Scenario 1:

The Click That Could Cost Lives

watch video

Completed

Congratulations, you have successfully completed

❌ Ignore update notifications during work hours to avoid interruptions and update the device later when convenient: Delaying updates leaves devices vulnerable to attacks that exploit known security flaws.

❌ Immediately click on any email marked as “URGENT” to avoid delays in patient care: While urgency is important in healthcare, acting without verifying the sender or content can lead to security breaches.

Verify the sender's email address carefully before opening attachments or clicking links: Phishing emails often use slight variations in email addresses to trick recipients. You need to verify the sender's email address carefully before opening attachments or clicking links.

Disable automatic updates to ensure control over which updates are installed: Automatic updates help ensure that systems stay secure even if users forget to update them manually.

Ensure Werner’s tablet software and applications were updated regularly to the latest version: Keeping software up-to-date is crucial as updates often include patches for security vulnerabilities that cyber attackers exploit.

Report suspicious emails to the IT department for verification before opening them: IT teams are trained to recognize threats and can confirm whether an email is legitimate or malicious.

Correct Action

Correct Action

Correct Action

Incorrect Action

Incorrect Action

Incorrect Action

Incorrect Action

Next

Scenario 2:

A Network in Crisis

watch video

Test 2

Completed

Congratulations, you have successfully completed

❌ Trust emails from known suppliers without verification, as they are already established contacts: Cyber attackers often impersonate trusted entities to trick users into clicking malicious links or downloading harmful attachments.

❌ Postpone installing software updates until the end of the workweek to avoid disruptions during busy shifts: Delaying updates increases the risk of attacks, as vulnerabilities remain unpatched.

Enable automatic updates on devices to ensure systems stay up to date without requiring manual intervention: Automatic updates help ensure devices are protected even if users forget to update manually.

Rely solely on antivirus software to protect the network, assuming it will block all threats automatically: Antivirus software is just one layer of protection and cannot prevent all cyberattacks, especially sophisticated ones like phishing or ransomware.

Regularly update all devices, including Werner's tablet, to ensure they are running the latest software and security patches: Updates are critical for patching security vulnerabilities that cyber attackers exploit.

JUse multi-factor authentication (MFA) on all systems to add an extra layer of security when accessing sensitive information: MFA significantly reduces the risk of unauthorized access to systems.

Correct Action

Correct Action

Correct Action

Incorrect Action

Incorrect Action

Incorrect Action

Incorrect Action

Next

Scenario 3:

Lessons from a Breach

watch video

Completed

Congratulations, you have successfully completed

Report unusual activity, such as new software installations or changes in system behavior, immediately to the IT department: Early reporting of suspicious activity helps IT staff investigate and address potential breaches before they escalate.

Use strong, unique passwords for accessing all hospital systems and change them regularly to reduce the risk of unauthorized access: Strong passwords are essential for reducing the risk of brute force attacks and unauthorized access.

Regularly conduct security audits and vulnerability assessments of hospital systems to identify and fix potential risks: Proactive identification of risks allows for mitigation before cybercriminals exploit them.

❌ Assume that antivirus software alone is sufficient to protect against all forms of cyberattacks

❌Disable firewall protection temporarily if it interferes with the performance of hospital systems during peak hours.

Share login credentials with colleagues during emergencies to ensure smooth workflow and quick patient care

Correct Action

Correct Action

Correct Action

Incorrect Action

Incorrect Action

Incorrect Action

Incorrect Action

Next

Completed

Congratulations, you have successfully completed