Security Talks Episode 4 (Part I): What’s the Relation Between a Post-it Note and a Security Breach?