PREVENTION
start
Disclaimer
The videos in the ESCAPE project were developed using a combination of digital and automated creative tools (AI). As a result, some visual elements may vary between videos.
In particular, the appearance of characters, including their uniforms, physical features, and overall presentation, may not accurately reflect the typical appearance of care or health workers in your home country or local context.
These variations are a technical result of the AI tools used in the production process and do not affect the educational content or objectives of the ESCAPE project.
Scenario 1:
The Click That Could Cost Lives
watch video
Completed
Congratulations, you have successfully completed
❌ Ignore update notifications during work hours to avoid interruptions and update the device later when convenient: Delaying updates leaves devices vulnerable to attacks that exploit known security flaws.
❌ Immediately click on any email marked as “URGENT” to avoid delays in patient care: While urgency is important in healthcare, acting without verifying the sender or content can lead to security breaches.
Verify the sender's email address carefully before opening attachments or clicking links: Phishing emails often use slight variations in email addresses to trick recipients. You need to verify the sender's email address carefully before opening attachments or clicking links.
Disable automatic updates to ensure control over which updates are installed: Automatic updates help ensure that systems stay secure even if users forget to update them manually.
Ensure Werner’s tablet software and applications were updated regularly to the latest version: Keeping software up-to-date is crucial as updates often include patches for security vulnerabilities that cyber attackers exploit.
Report suspicious emails to the IT department for verification before opening them: IT teams are trained to recognize threats and can confirm whether an email is legitimate or malicious.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 2:
A Network in Crisis
watch video
Test 2
Completed
Congratulations, you have successfully completed
❌ Trust emails from known suppliers without verification, as they are already established contacts: Cyber attackers often impersonate trusted entities to trick users into clicking malicious links or downloading harmful attachments.
❌ Postpone installing software updates until the end of the workweek to avoid disruptions during busy shifts: Delaying updates increases the risk of attacks, as vulnerabilities remain unpatched.
Enable automatic updates on devices to ensure systems stay up to date without requiring manual intervention: Automatic updates help ensure devices are protected even if users forget to update manually.
Rely solely on antivirus software to protect the network, assuming it will block all threats automatically: Antivirus software is just one layer of protection and cannot prevent all cyberattacks, especially sophisticated ones like phishing or ransomware.
Regularly update all devices, including Werner's tablet, to ensure they are running the latest software and security patches: Updates are critical for patching security vulnerabilities that cyber attackers exploit.
JUse multi-factor authentication (MFA) on all systems to add an extra layer of security when accessing sensitive information: MFA significantly reduces the risk of unauthorized access to systems.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 3:
Lessons from a Breach
watch video
Completed
Congratulations, you have successfully completed
Report unusual activity, such as new software installations or changes in system behavior, immediately to the IT department: Early reporting of suspicious activity helps IT staff investigate and address potential breaches before they escalate.
Use strong, unique passwords for accessing all hospital systems and change them regularly to reduce the risk of unauthorized access: Strong passwords are essential for reducing the risk of brute force attacks and unauthorized access.
Regularly conduct security audits and vulnerability assessments of hospital systems to identify and fix potential risks: Proactive identification of risks allows for mitigation before cybercriminals exploit them.
❌ Assume that antivirus software alone is sufficient to protect against all forms of cyberattacks
❌Disable firewall protection temporarily if it interferes with the performance of hospital systems during peak hours.
Share login credentials with colleagues during emergencies to ensure smooth workflow and quick patient care
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Completed
Congratulations, you have successfully completed
PREVENTION
Bhupender Singh
Created on August 18, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Science Breakout
View
Mystery Breakout
View
Musical Room Escape
View
Submarine Escape Game
View
Earth Day Escape Room
View
Corporate Escape Room: Operation Christmas
View
Witchcraft Escape Room
Explore all templates
Transcript
PREVENTION
start
Disclaimer
The videos in the ESCAPE project were developed using a combination of digital and automated creative tools (AI). As a result, some visual elements may vary between videos. In particular, the appearance of characters, including their uniforms, physical features, and overall presentation, may not accurately reflect the typical appearance of care or health workers in your home country or local context. These variations are a technical result of the AI tools used in the production process and do not affect the educational content or objectives of the ESCAPE project.
Scenario 1:
The Click That Could Cost Lives
watch video
Completed
Congratulations, you have successfully completed
❌ Ignore update notifications during work hours to avoid interruptions and update the device later when convenient: Delaying updates leaves devices vulnerable to attacks that exploit known security flaws.
❌ Immediately click on any email marked as “URGENT” to avoid delays in patient care: While urgency is important in healthcare, acting without verifying the sender or content can lead to security breaches.
Verify the sender's email address carefully before opening attachments or clicking links: Phishing emails often use slight variations in email addresses to trick recipients. You need to verify the sender's email address carefully before opening attachments or clicking links.
Disable automatic updates to ensure control over which updates are installed: Automatic updates help ensure that systems stay secure even if users forget to update them manually.
Ensure Werner’s tablet software and applications were updated regularly to the latest version: Keeping software up-to-date is crucial as updates often include patches for security vulnerabilities that cyber attackers exploit.
Report suspicious emails to the IT department for verification before opening them: IT teams are trained to recognize threats and can confirm whether an email is legitimate or malicious.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 2:
A Network in Crisis
watch video
Test 2
Completed
Congratulations, you have successfully completed
❌ Trust emails from known suppliers without verification, as they are already established contacts: Cyber attackers often impersonate trusted entities to trick users into clicking malicious links or downloading harmful attachments.
❌ Postpone installing software updates until the end of the workweek to avoid disruptions during busy shifts: Delaying updates increases the risk of attacks, as vulnerabilities remain unpatched.
Enable automatic updates on devices to ensure systems stay up to date without requiring manual intervention: Automatic updates help ensure devices are protected even if users forget to update manually.
Rely solely on antivirus software to protect the network, assuming it will block all threats automatically: Antivirus software is just one layer of protection and cannot prevent all cyberattacks, especially sophisticated ones like phishing or ransomware.
Regularly update all devices, including Werner's tablet, to ensure they are running the latest software and security patches: Updates are critical for patching security vulnerabilities that cyber attackers exploit.
JUse multi-factor authentication (MFA) on all systems to add an extra layer of security when accessing sensitive information: MFA significantly reduces the risk of unauthorized access to systems.
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Scenario 3:
Lessons from a Breach
watch video
Completed
Congratulations, you have successfully completed
Report unusual activity, such as new software installations or changes in system behavior, immediately to the IT department: Early reporting of suspicious activity helps IT staff investigate and address potential breaches before they escalate.
Use strong, unique passwords for accessing all hospital systems and change them regularly to reduce the risk of unauthorized access: Strong passwords are essential for reducing the risk of brute force attacks and unauthorized access.
Regularly conduct security audits and vulnerability assessments of hospital systems to identify and fix potential risks: Proactive identification of risks allows for mitigation before cybercriminals exploit them.
❌ Assume that antivirus software alone is sufficient to protect against all forms of cyberattacks
❌Disable firewall protection temporarily if it interferes with the performance of hospital systems during peak hours.
Share login credentials with colleagues during emergencies to ensure smooth workflow and quick patient care
Correct Action
Correct Action
Correct Action
Incorrect Action
Incorrect Action
Incorrect Action
Incorrect Action
Next
Completed
Congratulations, you have successfully completed