Skip to Content
Course content

Setting up your plans and billing

Real-World Scenario: A Small Mistake With Big Consequences

Recently, Binary City experienced an internal security incident that highlights how small everyday decisions can create serious risks for the company.

During routine work on-site, a contractor requested internet access. An employee, wanting to be helpful, shared the password to the company’s “BCityDevice” Wi-Fi network.

At first glance, this seemed harmless. The intention was simply to help the contractor to stay connected.

However, this network was not intended for external access.

Because the password was shared, the contractor’s device was able to connect to an internal network that is intended only for the use by authorised staff. In the wrong circumstances, a person with the right technical knowledge could potentially use such access to:

  • Explore internal network resources
  • Attempt to access company systems
  • Identify vulnerabilities within the network
  • Launch further attacks against company infrastructure

Fortunately, this situation was identified before any damage occurred. However, it clearly demonstrated an important lesson: Even well-intended actions can unintentionally expose the company to risk.

This is why security procedures exist.

They are not designed to slow down work or make things difficult. Instead, they ensure that:

  • Access is granted safely
  • Systems remain protected
  • Sensitive information is not exposed

Most security incidents do not happen because someone intended harm.

They happen because someone was trying to help, move quickly, or solve a problem.

This training module is designed to help everyone recognise these situations and know what the correct action should be.

Remember: Security starts with everyday decisions.


Introduction

Information security is not only the responsibility of the IT team (Systems Administration) or management. Every Binary City employee plays a role in protecting Binary City’s systems, data, clients, and reputation.

Most security incidents worldwide are not caused by advanced hackers or complex technical attacks. Instead, they are often the result of simple everyday mistakes, such as:

Sharing network access with the wrong person

Leaving devices unlocked

Accidentally sharing sensitive information

Allowing unauthorised people access to secure areas

These mistakes are rarely intentional. However, even small oversights can create serious risks for the organisation.

This training module focuses on practical, real-world behaviour that helps prevent these situations. The goal is to make sure that every employee understands:

  • How everyday actions affect security
  • How attackers exploit small mistakes
  • What you should do in common workplace situations

By the end of this module, you should feel confident about how to protect Binary City in your day-to-day work.


Why Small Mistakes Create Big Risks

Many security incidents begin with something small.


Examples of everyday mistakes include:


  • Sharing a Wi-Fi password with someone who should not have access
  • Sharing passwords without utilising a tool like 1Password.
  • Writing down passwords
  • Leaving confidential documents visible on a desk
  • Leaving a computer unlocked when stepping away
  • Providing internal information to someone without verifying who they are


Attackers often look for these small gaps because they are easier to exploit than complex technical vulnerabilities.


For example: An attacker may pretend to be a contractor or visitor and ask for network access.


If they receive access to the wrong network, they may be able to:


  • See internal systems
  • Access sensitive information
  • Attempt further attacks on company infrastructure


This is why we emphasise the principle: “A company is only as secure as its employees.”


Each employee’s actions help protect the organisation.


Stop & Think...

Think about your normal workday.


Have you ever:


  • Shared information quickly to help someone?
  • Left your desk without locking your computer?
  • Helped a visitor or contractor by giving them access to something?


These actions are usually done with good intentions.


However, attackers often rely on exactly these situations.


Question: What small action in your daily routine could unintentionally create a security risk?


Network Access & Wi-Fi Security​

Binary City uses different networks for different purposes. These networks are separated to protect sensitive systems.


These include:


  • Internal company network
  • Guest network
  • Testing network
  • Device network


These networks are not interchangeable, and access must be carefully controlled.


Important Rules

Employees must never share company Wi-Fi passwords with:


  • Contractors
  • Visitors
  • Clients
  • External vendors
  • Anyone not authorised to access the network
  • Staff members (each staff member must authenticate with their own credentials)


Even if someone appears trustworthy, network access must always be approved through the proper process.


If someone requires internet access:


  • Direct the visitor to reception
  • A guest WiFi voucher will be provided to the visitor to allow access to our guest network


This ensures the person receives only the access they require, and nothing more.

Handling Visitors, Contractors & External Parties

Binary City regularly works with contractors, suppliers, and visitors.


While these relationships are important, they must be managed securely.


Employees must never:


  • Provide system access independently
  • Share network credentials
  • Allow a visitor to use a network cable to go onto our networks
  • Allow visitors into restricted areas unsupervised
  • Share internal information without authorisation


Correct process

Never share the passwords for our internal company networks with anyone who is not explicitly authorised. This includes:


  • Contractors
  • Visitors
  • Clients
  • External vendors


Visitors and guests may use the designated Guest Wi-Fi. This network only provides access to the internet and does not give access to internal systems or company data.


If someone requests network access beyond the Guest Wi-Fi:


  • Do not grant it yourself
  • Follow the proper escalation procedures (contact your manager or the System Administrator)
  • Always verify that access is necessary and approved


Remember: Using the Guest Wi-Fi correctly keeps our systems secure while still allowing visitors to work online safely.


Stop & Think...

Imagine the following situation:


A contractor working on-site asks you for the Wi-Fi password so they can download

​something quickly.


​They seem legitimate, and the request appears harmless.


Ask yourself:


  • Do I know which network they would connect to?
  • Do I know what access that network provides?
  • Do I have the authority to grant that access?


Remember: Even small access permissions can expose internal systems if handled incorrectly.


Sensitive Information Handling

Binary City employees often work with internal and confidential information.


Examples include:


  • Customer information
  • Internal reports
  • Financial data
  • Client employee and clocking data
  • Client sensitive data
  • Technical system information
  • Source code or development data


This information must never be shared casually.


Before sharing any information, always ask:


  • Who is requesting this information?
  • Are they authorised to receive it?
  • Is there a secure way to share it?


If you are unsure, always ask your manager first.


Never assume information can be shared simply because someone asks for it.


Stop & Think...

Before sharing any information, pause and ask yourself three questions:


  • Who is requesting this information?
  • Are they authorised to receive it?
  • Would I be comfortable if this information became public?


If you cannot confidently answer these questions, stop and verify first.


Clear Desk & Clear Screen Behaviour

Physical security is just as important as digital security.


Even in trusted environments, information can be exposed if employees are not careful.


Clear Desk

When leaving your workspace:


  • Store sensitive documents in drawers or cabinets
  • Do not leave confidential information visible
  • Remove notes that contain passwords or sensitive information


Should you require guidance on the appropriate storage location for your devices, documents, and other items, please contact your manager for assistance.


Clear Screen

When leaving your computer:


  • Lock your screen
  • Ensure no sensitive information is visible
  • Prevent unauthorised viewing of your screen


This is especially important in shared workspaces or open offices.


Stop & Think...

Imagine someone walks past your desk while your computer is unlocked and sensitive information is visible on your screen.


Even if they do nothing malicious, they could accidentally see:


  • Client information
  • Internal reports
  • System details


Question: Would your current workspace pass a Clear Desk and Clear Screen check right now?


Device & Workspace Security

Many employees work with laptops, mobile devices, and other equipment.


These devices often contain sensitive information or company system access.


Important rules

Employees must:


  • Never leave devices unattended in public places
  • Keep devices physically secure
  • Use passwords and screen locks
  • Protect login credentials


If a device is lost or stolen, it must be reported immediately to the IT team and your manager.


Security for Remote Workers

Binary City supports remote work for employees located across Namibia and South Africa, as well as occasional remote work by HQ staff.


Working remotely requires extra awareness of security risks. To make it safe, Binary City uses special tools on company devices:


  • Trellix on Windows devices
  • Iru on Mac devices


These tools help protect your device automatically by:


  • Checking for malware or viruses
  • Keeping your software up to date
  • Ensuring your device follows company security rules


This means you don’t need to be a tech expert to keep your work safe, but you do need to follow some basic rules.


What staff must do when working remotely

Device safety:


  • Only use your company-assigned device. Do not let family, friends, or others use it.
  • Lock your device whenever you step away, even for a short time.
  • Keep your device in a safe place when not in use. For example:
    • At a coffee shop, don’t leave it on the table unattended.
    • At home, don’t leave it on a couch or desk where visitors might have access.
    • Be careful when traveling, don’t leave your laptop visible in a parked car.


Using Wi-Fi:


  • Home Wi-Fi:
    • Binary City’s tools (like Trellix and Iru) help protect your device even if your home Wi-Fi isn’t perfectly secure. You don’t need to worry about configuring your network.
  • Public Wi-Fi:
    • Often okay to use in Namibia and South Africa for general work. These networks may track user behavior, so avoid entering sensitive passwords or banking information when using public Wi-Fi.
  • If possible, use a password-protected Wi-Fi network, or a mobile hotspot if you are unsure of the network.
  • Check website security:
    • Only access websites that are secure. A secure website uses encryption to protect the information you enter (like passwords or personal data). You can check this by looking at the address in your browser:
      • It should start with https:// (the “s” stands for secure)
      • You may also see a padlock icon next to the web address
    • Avoid websites that do not have HTTPS or a padlock, especially when entering sensitive information like company accounts, banking, or personal details.


Mind your surroundings:

  • Be aware of who can see or hear your work. Examples:
    • Don’t discuss sensitive company information loudly in public or shared spaces. Noise-cancelling headphones are prone to make the user unaware of how loud they talk.
    • Be mindful of “shoulder surfing”, where someone is looking over your shoulder to see your screen. This can happen in coffee shops, airports, or even at home if visitors are around.


Stop & Think...

Before you start working remotely, pause and ask yourself:


  • Is my device secure and only being used by me?
  • Have I locked my device when stepping away?
  • Am I aware of my surroundings? Can someone see or hear what I’m working on?
  • If I’m on public Wi-Fi, am I avoiding sensitive logins or transactions?


Remember: Remote work must follow the same security standards as working in the office. Binary City’s protection tools keep your device safe, but your awareness and good habits are the key to keeping company data secure.


When Something Feels Wrong

Sometimes situations may feel unusual or suspicious.


Examples include:


  • Someone asking for information they should not need
  • Someone asking for system access unexpectedly
  • Suspicious emails or messages
  • Unauthorised persons in restricted areas


If something does not feel right: Trust your instincts.


Our employees should never feel uncomfortable reporting concerns.


Reporting Concerns

If you suspect a security issue:


  • Report it to your manager
  • Report it to the System Administrator
  • Report it to the ISMS Officer
  • Log an incident on our Intranet
  • Do not attempt to fix the issue yourself


Early reporting allows the company to respond quickly and prevent damage.


Remember: “When in doubt, escalate.”


It is always better to report something that turns out to be harmless than to ignore a real issue.


Role-Based Scenarios

The following examples show situations employees may encounter.


Scenario 1 – Contractor Request

A contractor asks you for the office Wi-Fi password so they can download files.


Correct response:


  • Do not share the password.
  • Contact reception to arrange proper network access.


Scenario 2 – Visitor in a Secure Area

You notice a visitor standing near company equipment without supervision.


Correct response:


  • Politely ask who they are visiting and notify the responsible employee or manager.


Scenario 3 – Unknown Information Request

Someone emails asking for internal documents and claims to be working with another department.


Correct response:


  • Verify the request with the department or manager before sharing anything.


Scenario 4 – Unlocked Computer

You notice a colleague’s computer is unlocked while they are away.


Correct response:


  • Lock the computer and inform the colleague so they can avoid the mistake in the future.
  • Although it may be amusing at the moment, do not post messages on the company’s communication channels, pretending to be the employee.
  • Report the incident.


Assessment

At the end of this module, employees must complete a knowledge assessment quiz.


The quiz will include scenario-based questions designed to confirm that the training has been understood.


Examples of questions include:


  • A contractor asks for the office Wi-Fi password. What should you do?
  • You notice confidential documents on a desk after hours. What is the correct action?
  • Someone requests internal information but you are unsure if they are authorised. What should you do?


Pass Requirement

To successfully complete this training:


  • Employees must achieve a minimum score of 90%.


If the pass mark is not achieved, you must review the training and retake the quiz.


This requirement ensures that all our employees understand their responsibilities and helps maintain a strong security culture across Binary City.


Stop & Think – Final Reflection

Before starting the quiz, take a moment to reflect: Security incidents rarely happen because someone intended to cause harm.


They happen because someone:


  • Wanted to help
  • Was in a hurry
  • Assumed something was safe


The goal of this training is simple: Pause. Think. Verify.


Small decisions made every day protect Binary City’s systems, clients, and reputation.


👉 Click here to start the ISMS quiz


Final Message

Security is not just about systems and technology.


It is about people making the right decisions every day.


Each employee plays an important role in protecting:


  • Our colleagues
  • Our clients
  • Our systems
  • Our reputation


Security starts with you.


How to set up your plans and billing

Step 1. Once logged into the system go to Manage and click on Manage under sub heading Plans and billing, see screenshot below for aid.



Step 2. Select whether you will be paying on “Flexible” or “Annual”.



Step 3. Once you’ve selected the option in Step 2, please complete the number of employees, devices and users you’ll require on the right hand side of the screen.

The fields with the stars are marked as compulsory.



Please note: 

When selecting flexible, this will give you an indicative pricing of what the system will cost you per month, but the actual count of employees, visitors, users, devices and API keys will be used to determine your monthly cost.

When selecting annual, at this stage - you are committing to an annual amount of employees, users, devices and API keys. If you exceed any of these counts in a specific month, you’ll be charged in that month for the quantity that you exceeded with.

Step 4. Now click on the “Invoice detail” tab to indicate the date of the month you want to be invoiced



Step 5. Once you’ve indicated everything in Step 3 and 4, please select your “Payment method” by clicking on the “Payment method” tab and selecting one of the options available:

  1. Debit or credit card (For help on this, review Step 5.1 below)

  2. Debit order (For help on this, review Step 5.2 below)


Step 5.1   When selecting “Debit or credit card”:

  1. Click on the button: “Authorise a card”

  2. Fill in your Card Number, Expiry Date, Name on  Card, CVC Number and your Email Address, and then click Register


Step 5.2   When selecting “Debit order”:

  1. Please choose the bank from which you wish to pay from

  2. Fill in:

    1. Branch name

    2. Branch code

    3. Account type

    4. Account number

    5. Account holder name

    6. Account number

  3. Lastly, attach a scanned copy of any proof of bank detail, such as:

    1. A cancelled cheque

    2. A bank letter confirming the bank account

    3. A bank statement

    4. etc.


Step 6. And you’re done. If you need any help with this, please call our sales department on +264 83 311 2000 who will be more than willing to assist you with this or you can contact us by completing this form.

Renewal of Annual Plan prior to expiry date

All active users of a profile will receive reminder notifications in the form of emails RE an Annual Plan renewal period. These periods are as follows:

  1. 30 days prior

  2. 15 days prior

  3. On the last day, before a profile is overdue

A user with sufficient Plans & billing access, can renew their Plans & billing 30 days (or less) prior to their profile becoming suspended, until a renewal decision is made. At this stage, a user will have the option to again decide on an Annual Plan, or change to Flexible Plan. To renew Plans & billing, the following action at Plans & billing may be used: "Start Plan renewal".


If the renewal process has been started, it can be cancelled by using action, "Cancel Plan renewal process".


Renewal of Annual Plan after it has expired

If your Annual Plan has expired, your profile will be suspended, until a decision with regard to renewal has been made. You may either use URL, "start plan renewal" or action, "Start Plan renewal", by navigating via the vertical ellipses. Please note steps above for more information regarding the renewal process.

Change to Annual Plan, when Plan is on Flexible

A profile, when on plan type, Flexible, may change to a Annual Plan, by using action, "Change to Annual Plan".


When this process has been started, it can be cancelled by using action, "Cancel change to Annual Plan process".


Buy more Annual quantities, when Plan is on Annual

When a profile is on an Annual Plan, a user with sufficient access can buy more Annual quantities, which will prevent Flexible invoices from being raised because of quantities that exceed the Annual quantities bought. Payment of invoices of additional quantities bought will be collected through the payment method as specified at Plans & billing \ tab, Payment method. Cost and discount is determined on a pro rata per monthly basis. In other words, if the Annual period is from 01 Jan 2018 - 31 Dec 2018 and more quantities are bought on the 15th of Jul, cost and discount is worked out on 6 months.

To start the process of buying more quantities, a user may use action, "Buy more Annual quantities".


When the process has been started, it can be canceled by using action, "Cancel buy more Annual quantities process".


If you need any help with this, please call our sales department on +264 83 311 2000 who will be more than willing to assist you with this or you can contact us by completing this form.

Rating
0 0

There are no comments for now.

to be the first to leave a comment.