According to the statistics published by research group IDC, The World’s Data Hits 163 Zettabytes In 2025. While the world is witnessing a data explosion, there is something which often gets overlooked i.e Protecting and Disposing of Data Securely.
With huge volumes of data generated daily, it becomes the equal responsibility of the organisation to safely dispose of the unwanted data. For example, the old backups, data that are no more relevant and past unwanted records etc. These files need to be erased, deleted and disposed of properly.
Right click on the file and click delete….The file is a history now.
We all are aware of this simple function of deleting a file from your hard drive or USB drives etc. But do you know that this files can be easily recovered?
Don’t get surprised as the modern tools can recover the deleted contents from your hard drive.
While we talk about disposing the data safely in a secure manner, it can even include the non technological devices like the waste bins where you throw the paper. Sometimes even the waste bins can contain confidential information which was thrown with the papers. For example, the user login details that you wrote on a paper, or your credit card details etc.
Hence as any other learning topics in the cyber security, protecting and disposing of data securely weighs equal importance.
This blog discusses how a scenario based e-learning module can train your employees.
The e-learning module opens with a scenario of showing Mr. Sam who is back to work after his vacation. Before starting his day, Sam decides to clean his office desk by discarding the unwanted files and documents. In a hurry, Sam just dumps the documents to the waste bin.
With the discarded notes, he unknowingly throws a paper which included his new credit card details. Just the next day, Sam receives an sms from his bank saying that his credit card is charged for 12**** USD.
The module pauses here and shows the screen for assessments which include multiple choice questions. Once the learner answer the questions correctly, the module replays showing what went wrong and what are the correct procedures.
Let’s see another scenario where an email is successfully recovered from the trash section.
Mr. George is a senior officer in a popular investment bank. The nature of his work sometimes demands confidentiality as he has access to several confidential or insider information about some companies.
One fine day, George forgets to lock down his laptop and his personal assistant with vested interests gains access to the mailbox to find confidential information in the trash folders and h he uses it for personal gain. While George deleted the file from his main inbox, the file still remained in the trash items which resulted in the data breach.
The module pauses here for the assessment where the learner has to identify what went wrong.
These two examples show how effectively you can train your employees in a scenario-based e-learning on Protecting and Disposing of Data Securely. While classroom training is still used, the hours of lectures can simply disengage the learners. Hence, I recommend implementing a scenario based e-learning on protecting and disposing of data securely.