The Human Factor: 5 Security Blunders People Keep Making

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Next

Sharing Devices with Family and Friends

This one is especially apt after the holidays, since many people received new devices as gifts and are figuring out how to use them. According to a survey by Kaspersky Lab, one respondent in three reported sharing their computers, phones and tablets, and of those, 32 percent take no precautions to protect their information. Unfortunately, grandma or little Joey may not be sufficiently aware of cyber threats, making them susceptible to scammers or being tricked into downloading malware.

Much of today's security news is about the latest hacks by cyber criminals, and how they exploited some obscure software vulnerability to break into systems and wreak havoc.

But often a breach will start with something more mundane. Ever since people started sending emails and using the Internet, they have been making the same careless mistakes that leave sensitive information and the business at risk. Sure people are under pressure, they're in a hurry, and they need to get the job done, but sometimes they let their guard down.

No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end. In this slideshow, Daren Glenister, field chief technology officer, Intralinks, has identified five all-too-common mistakes users need to be careful to avoid.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.