dcsimg

The Human Factor: 5 Security Blunders People Keep Making

  • The Human Factor: 5 Security Blunders People Keep Making-

    People Will Make Mistakes – Be Prepared

    Human nature being what it is, people will continue to make silly mistakes and fail to follow security precautions no matter how much you remind them. Since they're probably not going to tell you when something bad happens, it's best to be prepared at the outset.

    Many organizations are turning to Information Rights Management (IRM) technology that embeds encryption and user permissions directly into a file, including who is authorized to view it. If your sensitive data falls into the wrong hands, access can be immediately revoked, keeping the information safe. Think of it as mistake insurance, providing protection when people let their guards down – as they inevitably will.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

The Human Factor: 5 Security Blunders People Keep Making

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • The Human Factor: 5 Security Blunders People Keep Making-7

    People Will Make Mistakes – Be Prepared

    Human nature being what it is, people will continue to make silly mistakes and fail to follow security precautions no matter how much you remind them. Since they're probably not going to tell you when something bad happens, it's best to be prepared at the outset.

    Many organizations are turning to Information Rights Management (IRM) technology that embeds encryption and user permissions directly into a file, including who is authorized to view it. If your sensitive data falls into the wrong hands, access can be immediately revoked, keeping the information safe. Think of it as mistake insurance, providing protection when people let their guards down – as they inevitably will.

Much of today's security news is about the latest hacks by cyber criminals, and how they exploited some obscure software vulnerability to break into systems and wreak havoc.

But often a breach will start with something more mundane. Ever since people started sending emails and using the Internet, they have been making the same careless mistakes that leave sensitive information and the business at risk. Sure people are under pressure, they're in a hurry, and they need to get the job done, but sometimes they let their guard down.

No matter how much you nag people, plead with them and warn them, these mistakes and risky behaviors never seem to end. In this slideshow, Daren Glenister, field chief technology officer, Intralinks, has identified five all-too-common mistakes users need to be careful to avoid.