The Human Factor: 5 Security Blunders People Keep Making

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Next

Sending Emails to the Wrong Address

Virtually everyone has done this at one time or another – transposing a character, forgetting a dash, using ".com" instead of ".org", etc. It's when contents are sensitive and not encrypted that the real drama begins. A Google search will reveal many urgent requests on security forums from people who sent confidential files to the wrong address, and are now pleading for advice. According to research by Ponemon Institute, 62 percent of respondents have accidentally sent files to people outside the organization who were not authorized to see them. Talk about rolling the dice!

Much of today's security news is about the latest hacks by cyber criminals, and how they exploited some obscure software vulnerability to break into systems and wreak havoc.

But often a breach will start with something more mundane. Ever since people started sending emails and using the Internet, they have been making the same careless mistakes that leave sensitive information and the business at risk. Sure people are under pressure, they're in a hurry, and they need to get the job done, but sometimes they let their guard down.

No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end. In this slideshow, Daren Glenister, field chief technology officer, Intralinks, has identified five all-too-common mistakes users need to be careful to avoid.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.