{"id":36,"date":"2021-09-07T14:03:48","date_gmt":"2021-09-07T14:03:48","guid":{"rendered":"http:\/\/caterinhuang.com\/dataheist\/?page_id=36"},"modified":"2021-09-12T09:20:55","modified_gmt":"2021-09-12T09:20:55","slug":"why-data-heist","status":"publish","type":"page","link":"http:\/\/caterinhuang.com\/dataheist\/why-data-heist\/","title":{"rendered":"Why Data Heist?"},"content":{"rendered":"\n<p>According to a <a rel=\"noreferrer noopener\" href=\"https:\/\/www.weforum.org\/reports\/the-global-risks-report-2021\" target=\"_blank\">Global Risk Perception<\/a> survey conducted by the World Economic Forum; Cyber Risk ranks among one of the top risk concerns in all over the world. This is not surprising because of several recent high-profile cyber-attacks that resulted massive amounts of personal data stolen and disrupted operations has caught global eye balls and raised concerns among the business communities and governments.&nbsp;<\/p>\n\n\n\n<iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/T8VOaN926Ak\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe>\n\n\n\n<p><strong>BENEFITS OF DATA HEIST<\/strong><br>Data Heist was created to be a learning tool to educate on topics related to data protection and personal cyber hygiene. Here are some of the benefits:<\/p>\n\n\n\n<ul><li>Fun and engaging way to educate players on data protection and cyber hygiene&nbsp;<\/li><li>Players get to experience through a tabletop simulation of how hacking takes place&nbsp;<\/li><li>Real threats can be made known to players so that they can be more vigilant<\/li><li>Simple game play suitable for children who are able to count<\/li><li>Vocabulary related to data protection and cyber hygiene<\/li><li>Additional features and rules in place to engage more matured players<\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>LEARNING OBJECTIVES<\/strong><br>Data Heist is designed so that when the game is facilitated by an adult or trained educator, these are some of the learning objectives that can be achieved after the game.<\/p>\n\n\n\n<ul id=\"order\"><li>Develop awareness of the online threats and possible ways scammers work<\/li><li>Understand that every organization and individual is susceptible to attacks<\/li><li>Recognize common types of cyber attacks<\/li><li>Recognize various threat actors<\/li><li>Apply good person cyber hygiene habits<\/li><li>Identify different methods of protecting data&nbsp;<\/li><li>Identify data protection weaknesses of organizations&nbsp;<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"jetpack-related-posts":[{"id":244,"url":"http:\/\/caterinhuang.com\/dataheist\/","url_meta":{"origin":36,"position":0},"title":"About Data Heist","date":"September 12, 2021","format":false,"excerpt":"Why Data Heist? Order Now Get one for you here!","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15,"url":"http:\/\/caterinhuang.com\/dataheist\/what\/","url_meta":{"origin":36,"position":1},"title":"What is Data Heist?","date":"September 7, 2021","format":false,"excerpt":"","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":180,"url":"http:\/\/caterinhuang.com\/dataheist\/privacy\/","url_meta":{"origin":36,"position":2},"title":"Privacy Notice","date":"September 8, 2021","format":false,"excerpt":"This Data Protection Notice (\u201cNotice\u201d) sets out the basis which Hotspot Explorer Pte Ltd (\u201cwe\u201d, \u201cus\u201d, or \u201cour\u201d) may collect, use, disclose or otherwise process personal data of our customers in accordance with the Personal Data Protection Act (\u201cPDPA\u201d). This Notice applies to personal data in our possession or under\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38,"url":"http:\/\/caterinhuang.com\/dataheist\/about-us\/","url_meta":{"origin":36,"position":3},"title":"About Us","date":"September 7, 2021","format":false,"excerpt":"Meet The Creator Mark Barnabas Lee was an educator in school and now a Data Protection and Privacy Practitioner who provides advisory and training on Personal Data Protection, Risk Management and Operational Excellence. He is currently based in Singapore and has lived in China, India, Malaysia and Philippines in his\u2026","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":67,"url":"http:\/\/caterinhuang.com\/dataheist\/using-praesidium\/","url_meta":{"origin":36,"position":4},"title":"Using Praesidium","date":"September 7, 2021","format":false,"excerpt":"For privacy and data protection practitioners who would like to know how to use Praesidium as a consulting tool please contact us here","rel":"","context":"Similar post","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/36"}],"collection":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":23,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":241,"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/pages\/36\/revisions\/241"}],"wp:attachment":[{"href":"http:\/\/caterinhuang.com\/dataheist\/wp-json\/wp\/v2\/media?parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}