Want to create interactive content? It’s easy in Genially!

Get started free

Branching Scenario: Digital Alert

vincent armstrong

Created on November 4, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Teaching Challenge: Transform Your Classroom

Branching Scenario Mission: Innovating for the Future

Branching Scenarios Challenge Mobile

Branching Scenario: Academic Ethics and AI Use

Branching Scenario: College Life

Strategic Decisions: Branching Scenario

Branching Scenarios Challenge

Transcript

⚠️

Branching Scenario:

Digital Alert

Enterprise Cybersecurity Scenario: What decisions would you make to protect your organization's information?

Let's go!

Introduction

The company is detecting increasingly frequent cyberattack attempts. Today, you will need to make key decisions in various situations: from suspicious emails to remote access and handling external devices. Your choices will determine the level of protection achieved. Remember: every decision has consequences.

Start

You receive an email from an unknown sender with an attachment. The subject says: ‘Pending invoice – Urgent actions’

The IT department confirms that it was a phishing attempt and now your team needs to work from home, so you need to implement certain actions.

You deleted the email, but other colleagues also received it, they don't know how to act, and now that your team needs to work from home, there is a need to organize remote access. What do you do?

Remote access via VPN is functioning correctly. However, you notice that the workload has increased and some employees are sharing sensitive files through unofficial channels (personal email, messaging apps). How do you respond?

Remote access with shared passwords speeds up work, but complaints soon arise: a couple of accounts have been compromised and teams suspect unauthorized access. What do you do?

Remote access is working, but the lack of controls is starting to generate unauthorized access attempts from external addresses. Your team requests a solution.

After consulting with IT, you discover that some employees are using personal devices to connect without proper protection. IT suggests safer options.

The project is completed, but vulnerabilities are detected due to poorly controlled access. The team learns that speed does not always mean security.

Some security measures are taken, although there are weak points. The team becomes more aware and commits to strengthening controls in the future.

Good practices were applied: phishing detection, secure access, and controlled environments. The project is successfully executed, and the company strengthens its cybersecurity culture.