Lesson 10

Loose Lips Sink Ships

Protecting Sensitive Information

The Coffee Shop Spy

Two colleagues are catching up at a coffee shop after work:

Alex:

"So stressed about the Acme Corp acquisition. The due diligence is killing me."

Jordan:

"Tell me about it. The numbers look good though - we're offering $50 million, right?"

Alex:

"Yeah, but keep it quiet. Supposed to announce next month after the board meeting on the 15th."

At the next table, someone is listening carefully. They're an investor who will now trade on this material non-public information. Or a competitor who will swoop in with a counter-offer. Or a journalist who will break the story early.

Information Leaks Are Everywhere

Social Media

Posting about projects, travel, or frustrations reveals patterns and information

Public Conversations

Elevators, restaurants, airports - you never know who's listening

Screen Visibility

Working on a plane or in a coffee shop with sensitive documents visible

Discarded Documents

Papers in the trash, whiteboards left visible, sticky notes with passwords

What Attackers Want

  • Organizational Charts: Who has authority to approve what?
  • Project Names/Timelines: For targeted attacks or competitive intel
  • Travel Schedules: When executives will be vulnerable or unavailable
  • Technology Details: What systems to target
  • Personal Information: For social engineering attacks

Protecting Information

1
Be Aware of Your Surroundings

Before discussing sensitive topics, check who might overhear

2
Use a Privacy Screen

Filters that prevent people beside you from seeing your screen

3
Think Before You Post

Social media reveals more than you think about your work and life

4
Shred Sensitive Documents

Dumpster diving is a real reconnaissance technique

Test Your Knowledge

Answer these questions to complete the lesson.

1. What was the security problem with Alex and Jordan's coffee shop conversation?

2. Why might an attacker want to know an executive's travel schedule?

3. What is a 'privacy screen' and why would you use one?

4. You need to discuss a confidential project with a colleague while traveling. What's the best approach?