Think Like an Attacker
An interactive scenario where you explore common workplace situations from an attacker’s perspective.
Start
Welcome to the Scenario
You’re about to step into the digital environment of a fictional company. But attackers don’t look for obvious problems. They look for small gaps that people overlook.
Nothing here looks broken. Nothing looks obviously dangerous.
Click to begin exploring.
Next
Welcome to BrightSide Marketing
BrightSide Marketing is a small company with remote and in-office employees. They use common tools to get work done quickly and efficiently. At first glance, everything seems normal. But attackers often see things differently.
Next
Finished? Click here
The Unattended Device
Someone leaves their desk for a few minutes. Their device is still active and signed in. Nothing appears out of place. But unattended devices can create opportunities for security breaches.
Question
The Shared Network
An employee connects to public Wi-Fi at a café or airport. They log in to check email and access work files. Everything works as expected. But shared networks can expose data in ways that aren’t always visible.
Question
Shared Files & Data Access
Work files are stored online so everyone can collaborate easily. Access is shared broadly to keep work moving. Nothing seems restricted or unusual. But broad access can make sensitive information harder to control..
Question
What These Situations Have in Common
None of these situations involved advanced attacks. None required special tools or technical expertise. They worked because of:
- everyday habits
- shared access
- small, preventable gaps
Cybersecurity often fails quietly, long before anyone notices a problem.
Restart
— Key insight —
The more widely data is shared, the harder it is to control.
Click on the icons to reveal more information
What Doesn’t Matter
What the Attacker Gains
- How organized the files are
- How efficient collaboration feels
- How modern the storage system is
- More access points to the same data
- Greater chance of misuse or exposure
- The ability to benefit from a single weak point
TAKEAWAY: Convenience increases speed, but it can also multiply risk.
— Key insight —
An unattended workstation is an opportunity to exploit.
Click on the icons to reveal more information
What Doesn’t Matter
What the Attacker Gains
- Device age
- Screen size
- Physical appearance
- Immediate access
- Trusted identity
- Systems already unlocked
TAKEAWAY: Attackers focus on opportunity, not appearance.
— Key insight —
Public networks reduce control over how data moves.
Click on the icons to reveal more information
What Doesn’t Matter
What the Attacker Gains
- Data moving across shared networks
- Reduced visibility and control
- Opportunities to observe normal activity
- Internet speed
- Where employees prefer to work
- Extra login steps
TAKEAWAY: Attackers take advantage of shared environments, not broken systems.
Think Like an Attacker
Edyta Mrugala
Created on February 6, 2026
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Simple Branching Scenario Mobile
View
Branching Scenario: Leadership Decisions
View
Branching Scenario: Digital Alert
View
Conflict Resolution: Branching Scenarios
View
Simple Branching Scenario
View
Choose Your Own Story
View
Branching Scenario: Save Christmas
Explore all templates
Transcript
Think Like an Attacker
An interactive scenario where you explore common workplace situations from an attacker’s perspective.
Start
Welcome to the Scenario
You’re about to step into the digital environment of a fictional company. But attackers don’t look for obvious problems. They look for small gaps that people overlook.
Nothing here looks broken. Nothing looks obviously dangerous.
Click to begin exploring.
Next
Welcome to BrightSide Marketing
BrightSide Marketing is a small company with remote and in-office employees. They use common tools to get work done quickly and efficiently. At first glance, everything seems normal. But attackers often see things differently.
Next
Finished? Click here
The Unattended Device
Someone leaves their desk for a few minutes. Their device is still active and signed in. Nothing appears out of place. But unattended devices can create opportunities for security breaches.
Question
The Shared Network
An employee connects to public Wi-Fi at a café or airport. They log in to check email and access work files. Everything works as expected. But shared networks can expose data in ways that aren’t always visible.
Question
Shared Files & Data Access
Work files are stored online so everyone can collaborate easily. Access is shared broadly to keep work moving. Nothing seems restricted or unusual. But broad access can make sensitive information harder to control..
Question
What These Situations Have in Common
None of these situations involved advanced attacks. None required special tools or technical expertise. They worked because of:
- everyday habits
- shared access
- small, preventable gaps
Cybersecurity often fails quietly, long before anyone notices a problem.Restart
— Key insight —
The more widely data is shared, the harder it is to control.
Click on the icons to reveal more information
What Doesn’t Matter
What the Attacker Gains
TAKEAWAY: Convenience increases speed, but it can also multiply risk.
— Key insight —
An unattended workstation is an opportunity to exploit.
Click on the icons to reveal more information
What Doesn’t Matter
What the Attacker Gains
TAKEAWAY: Attackers focus on opportunity, not appearance.
— Key insight —
Public networks reduce control over how data moves.
Click on the icons to reveal more information
What Doesn’t Matter
What the Attacker Gains
TAKEAWAY: Attackers take advantage of shared environments, not broken systems.