The Human Factor: 5 Security Blunders People Keep Making

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next The Human Factor: 5 Security Blunders People Keep Making-4 Next

Using the Same Password for Work and Personal Accounts

Using separate, strong passwords for work and non-work is such a pain. The only bigger pain is when passwords are stolen, leading to other people using your accounts without your knowledge to steal sensitive data. For example, the massive breach at Target began when someone stole the credentials of an HVAC contractor. At Home Depot, attackers used a vendor's username and password to steal credit card details for 56 million people. A Verizon Data Breach Report found that a staggering 76 percent of network intrusions began with stolen credentials. We've all been warned about password safety, but apparently some people aren't listening!

Much of today's security news is about the latest hacks by cyber criminals, and how they exploited some obscure software vulnerability to break into systems and wreak havoc.

But often a breach will start with something more mundane. Ever since people started sending emails and using the Internet, they have been making the same careless mistakes that leave sensitive information and the business at risk. Sure people are under pressure, they're in a hurry, and they need to get the job done, but sometimes they let their guard down.

No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end. In this slideshow, Daren Glenister, field chief technology officer, Intralinks, has identified five all-too-common mistakes users need to be careful to avoid.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.