Course Content
Knowledge check & certification
0/1
Cybersecurity 101

🤝
Lesson 1.3
Shared responsibility model
Cybersecurity works best when everyone plays their part — the company builds secure systems, and we all use them responsibly.
Always watching. Always protecting.

🧠
What does “shared responsibility” mean?

Cybersecurity is not owned by one department. It’s not just IT. It’s not just leadership.
Security is a shared responsibility across the organization.

Every system, every login, and every action inside Sirix Remote Monitoring depends on people making safe decisions.

🏗️
Company builds
Tools, controls, policies, monitoring, incident response.
👤
Employees protect
Safe logins, verification, proper authorization, reporting.
🧯
Together reduce risk
Fast reporting + strong controls prevent incidents from spreading.

🏢
What the company is responsible for
  • Providing secure tools and systems
  • Implementing access controls and monitoring
  • Enforcing Multi-Factor Authentication (MFA)
  • Logging and auditing activity
  • Creating policies and procedures
  • Responding to incidents

We build the framework and controls that help protect the environment.

🧍
What employees are responsible for
  • Protecting logins and using MFA correctly
  • Never sharing accounts or passwords
  • Verifying requests before taking action
  • Following authorization and access rules
  • Reporting suspicious activity immediately
  • Using Sirix tools only for approved purposes

Even small decisions can prevent big incidents.

⚠️
Small actions, real consequences

Cyber incidents often start with something that feels minor. For example:

  • Approving an unexpected MFA prompt
  • Unlocking a door or gate without proper verification
  • Ignoring something that “just feels off”

If you’re unsure, pause and ask. If something looks suspicious, report it right away.

🎥
Why this matters in remote monitoring

Sirix Remote Monitoring supports real-time actions that can affect real locations and real people.
That’s why responsibility is shared.

  • Enable or disable alarms
  • Unlock approved doors or gates
  • Issue live voice interventions
  • Respond to security events in real time

Key takeaway

Technology alone doesn’t prevent incidents. Policies alone don’t prevent incidents.
The combination of secure systems and safe decisions does.

Every employee plays a role in protecting our customers, our systems, and our reputation.

If something feels off, slow down — then verify or report.

Always watching. Always protecting.