The Human Factor: 5 Security Blunders People Keep Making

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Previous The Human Factor: 5 Security Blunders People Keep Making-1 Next

Risky User Behaviors

Click through for five security blunders users make on an all-too-frequent basis, as identified by Daren Glenister, field chief technology officer, Intralinks.

Much of today's security news is about the latest hacks by cyber criminals, and how they exploited some obscure software vulnerability to break into systems and wreak havoc.

But often a breach will start with something more mundane. Ever since people started sending emails and using the Internet, they have been making the same careless mistakes that leave sensitive information and the business at risk. Sure people are under pressure, they're in a hurry, and they need to get the job done, but sometimes they let their guard down.

No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end. In this slideshow, Daren Glenister, field chief technology officer, Intralinks, has identified five all-too-common mistakes users need to be careful to avoid.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.