Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/2/2017
12:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

10 Mistakes End Users Make That Drive Security Managers Crazy

Here's a list of common, inadvertent missteps end users make that can expose company data.
Previous
1 of 11
Next

Image Source: Shutterstock

Image Source: Shutterstock

There's so much news about major hacks from nation-states such as Russia, North Korea, Iran, and various criminal gangs in Eastern Europe.

But what's less understood is that an important percentage of breaches stem from insiders. Forrester Research found that nearly 40% of all data breaches are caused by insiders. And of those insider breaches, 26% are caused by abuse or malicious intent by insiders, and 56% are caused by inadvertent misuse or sheer accidents by employees.

"Data is too often mishandled by employees," says Merritt Maxim, a principal analyst at Forrester Research who serves security and risk professionals. "A good tip for companies is to take more time classifying their data. If people understand what the organization considers sensitive, there's less of a chance that it will be mishandled."

Based on interviews with Forrester's Maxim and IDC's Frank Dickson and Robert Westervelt, we pinpointed 10 common ways employees mishandle - and inadvertently breach - an organization’s security.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
kwanlass
50%
50%
kwanlass,
User Rank: Apprentice
11/2/2017 | 2:24:15 PM
Timely topic
The slide about "Losing track of corrupted thumb drives" seems particularly timely after that USB drive was found on the streets of London last week with 70 unencrypted security files about from Heathrow International Airport. The question remains about how the drive ended up where it did but according to my client, Veriato, it's reasonable to assume this was an act by an insider with access to sensitive security data. Whatever the scenario, it definitely illustrates the dangers that trusted insiders can pose (whther inadvertently or maliciously) to their companies as well as to public safety and even national security. Will be interesting to see how this story unfolds.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days
Kelly Sheridan, Staff Editor, Dark Reading,  4/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The dead do not laugh...
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10551
PUBLISHED: 2020-04-09
QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\SYSTEM by writing ...
CVE-2020-10621
PUBLISHED: 2020-04-09
Multiple issues exist that allow files to be uploaded and executed on the WebAccess/NMS (versions prior to 3.0.2).
CVE-2020-11553
PUBLISHED: 2020-04-09
An issue was discovered in Castle Rock SNMPc Online 12.10.10 before 2020-01-28. There is pervasive CSRF.
CVE-2020-11554
PUBLISHED: 2020-04-09
An issue was discovered in Castle Rock SNMPc Online 12.10.10 before 2020-01-28. It allows remote attackers to obtain sensitive information via info.php4.
CVE-2020-11555
PUBLISHED: 2020-04-09
An issue was discovered in Castle Rock SNMPc Online 12.10.10 before 2020-01-28. It allows remote attackers to obtain sensitive credential information from backup files.