Six Ways to Play Your Part and Better Secure Your Workstation - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Know How Hackers Hack-6 Next

Know How Hackers Hack

While this particular advice might strike some as taking a somewhat technophobic route, the fact is that the majority of modern hacks make use of the Web browser as the attack vector. As a result, hackers are making use of various social engineering or other trickery to get users to visit specially crafted websites to exploit newly discovered vulnerabilities.

A close cousin of this form of attack involves the use of attached files that are specifically crafted to exploit known flaws in their corresponding software.

In spite of the tremendous sums of money that organizations spend each year to defend themselves against hackers and malware, successful security incursions continue to occur with dismaying frequency. In the race to acquire the most sophisticated security tools, many forget that the first line of defense is really the user.

Our Paul Mah has come up with a list of six simple ways that employees can enhance the security of their workstations. Be sure to check out Paul's full post on the subject at his blog.
 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.