⚠️
Branching Scenario:
Digital Alert
Enterprise Cybersecurity Scenario: What decisions would you make to protect your organization's information?
Let's go!
Introduction
The company is detecting increasingly frequent cyberattack attempts. Today, you will need to make key decisions in various situations: from suspicious emails to remote access and handling external devices. Your choices will determine the level of protection achieved. Remember: every decision has consequences.
Start
You receive an email from an unknown sender with an attachment. The subject says: ‘Pending invoice – Urgent actions’
The IT department confirms that it was a phishing attempt and now your team needs to work from home, so you need to implement certain actions.
You deleted the email, but other colleagues also received it, they don't know how to act, and now that your team needs to work from home, there is a need to organize remote access. What do you do?
Remote access via VPN is functioning correctly. However, you notice that the workload has increased and some employees are sharing sensitive files through unofficial channels (personal email, messaging apps). How do you respond?
Remote access with shared passwords speeds up work, but complaints soon arise: a couple of accounts have been compromised and teams suspect unauthorized access. What do you do?
Remote access is working, but the lack of controls is starting to generate unauthorized access attempts from external addresses. Your team requests a solution.
After consulting with IT, you discover that some employees are using personal devices to connect without proper protection. IT suggests safer options.
The project is completed, but vulnerabilities are detected due to poorly controlled access. The team learns that speed does not always mean security.
Some security measures are taken, although there are weak points. The team becomes more aware and commits to strengthening controls in the future.
Good practices were applied: phishing detection, secure access, and controlled environments. The project is successfully executed, and the company strengthens its cybersecurity culture.
Branching Scenario: Digital Alert
vincent armstrong
Created on November 4, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Teaching Challenge: Transform Your Classroom
View
Branching Scenario Mission: Innovating for the Future
View
Branching Scenarios Challenge Mobile
View
Branching Scenario: Academic Ethics and AI Use
View
Branching Scenario: College Life
View
Strategic Decisions: Branching Scenario
View
Branching Scenarios Challenge
Explore all templates
Transcript
⚠️
Branching Scenario:
Digital Alert
Enterprise Cybersecurity Scenario: What decisions would you make to protect your organization's information?
Let's go!
Introduction
The company is detecting increasingly frequent cyberattack attempts. Today, you will need to make key decisions in various situations: from suspicious emails to remote access and handling external devices. Your choices will determine the level of protection achieved. Remember: every decision has consequences.
Start
You receive an email from an unknown sender with an attachment. The subject says: ‘Pending invoice – Urgent actions’
The IT department confirms that it was a phishing attempt and now your team needs to work from home, so you need to implement certain actions.
You deleted the email, but other colleagues also received it, they don't know how to act, and now that your team needs to work from home, there is a need to organize remote access. What do you do?
Remote access via VPN is functioning correctly. However, you notice that the workload has increased and some employees are sharing sensitive files through unofficial channels (personal email, messaging apps). How do you respond?
Remote access with shared passwords speeds up work, but complaints soon arise: a couple of accounts have been compromised and teams suspect unauthorized access. What do you do?
Remote access is working, but the lack of controls is starting to generate unauthorized access attempts from external addresses. Your team requests a solution.
After consulting with IT, you discover that some employees are using personal devices to connect without proper protection. IT suggests safer options.
The project is completed, but vulnerabilities are detected due to poorly controlled access. The team learns that speed does not always mean security.
Some security measures are taken, although there are weak points. The team becomes more aware and commits to strengthening controls in the future.
Good practices were applied: phishing detection, secure access, and controlled environments. The project is successfully executed, and the company strengthens its cybersecurity culture.