🎓 Free Access Until March 1, 2026 — Learn cybersecurity without limits.

Lesson 5: Physical Security in the Office


Objective

To teach employees how to prevent cybersecurity breaches caused by physical access, theft, or carelessness within the workplace.


Why This Matters

Cybersecurity isn’t only about firewalls and software—it also includes physical protection of systems and sensitive data. A misplaced laptop, an unlocked desk, or an outsider walking into your office can cause a major data breach.


1. Lock Your Devices When Unattended

  • Always lock your laptop or desktop when stepping away (Windows + L or Cmd + Ctrl + Q).
  • Even if you leave for just 30 seconds—lock it.
  • Never assume others won’t peek or tamper.

2. Secure Printed Documents

  • Shred confidential documents.
  • Avoid leaving sensitive paperwork on desks or in meeting rooms.
  • Use locked drawers or cabinets for storage.

3. Control Access to Office Spaces

  • Do not allow strangers to follow you into secured areas (“tailgating”).
  • Challenge unknown visitors without a badge or escort.
  • Report suspicious persons immediately.

4. Protect Company Devices While Traveling

  • Do not leave laptops or work phones in cars unattended.
  • Use screen privacy filters in public areas.
  • Never connect to unknown USB devices or charging stations (risk of malware injection).

5. Monitor for Unauthorized Photography or Recordings

  • Be aware of anyone taking photos of whiteboards, screens, or desks.
  • Confidential meetings should not be recorded without proper authorization.
  • Keep sensitive work conversations private, even in public office spaces.

6. Use Security Badges and Keycards Responsibly

  • Never lend your badge or keycard to anyone.
  • Report lost or stolen access cards immediately.
  • Keep access credentials (PINs, codes) confidential.

7. Clean Desk Policy

  • At the end of the day, desks should be free of printed materials, post-its with passwords, and exposed tech.
  • Lock everything away—documents, USB sticks, and mobile devices.
  • This is not just tidiness—it’s protection.

Summary:

  • Physical access = digital risk.
  • Always lock devices and documents.
  • Control who enters your space.
  • Protect work devices even outside the office.
  • Report any suspicious activity quickly.

✅ Now it’s time to test what you’ve learned:

 

Results

#1. What is the recommended action when leaving your workstation, even briefly?

#2. Which of the following is an example of poor physical security practice?

#3. What is “tailgating” in the context of office security?

#4. What should you do if someone takes a photo of a confidential whiteboard?

#5. Why is a clean desk policy important?

#6. What’s the best way to transport company documents securely?

#7. What’s a safe habit when using public transportation with a work laptop?

#8. What’s the main risk of using public USB charging stations?

#9. What should you do if you lose your security badge?

#10. Why should passwords never be written on paper near your workstation?

Previous
Finish