Endpoint

11/2/2017
12:00 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

10 Mistakes End Users Make That Drive Security Managers Crazy

Here's a list of common, inadvertent missteps end users make that can expose company data.
2 of 11

Leaky Amazon S3 Buckets

End users often assume that when they are using cloud-based workloads they are automatically secure. Not so. S3 stands for simple storage service and when people put workloads in the cloud, it is still their responsibility to, at the very least, set a password. Administrators should keep on top of the staff to set simple passwords, but sometimes they forget as well. This is clearly a security hole that can be plugged by just paying some careful attention to security basics.

Image Source : Shutterstock

Leaky Amazon S3 Buckets

End users often assume that when they are using cloud-based workloads they are automatically secure. Not so. S3 stands for simple storage service and when people put workloads in the cloud, it is still their responsibility to, at the very least, set a password. Administrators should keep on top of the staff to set simple passwords, but sometimes they forget as well. This is clearly a security hole that can be plugged by just paying some careful attention to security basics.

Image Source : Shutterstock

2 of 11
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
kwanlass
50%
50%
kwanlass,
User Rank: Apprentice
11/2/2017 | 2:24:15 PM
Timely topic
The slide about "Losing track of corrupted thumb drives" seems particularly timely after that USB drive was found on the streets of London last week with 70 unencrypted security files about from Heathrow International Airport. The question remains about how the drive ended up where it did but according to my client, Veriato, it's reasonable to assume this was an act by an insider with access to sensitive security data. Whatever the scenario, it definitely illustrates the dangers that trusted insiders can pose (whther inadvertently or maliciously) to their companies as well as to public safety and even national security. Will be interesting to see how this story unfolds.
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
White Hat to Black Hat: What Motivates the Switch to Cybercrime
Kelly Sheridan, Staff Editor, Dark Reading,  8/8/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-13106
PUBLISHED: 2018-08-15
Cheetahmobile CM Launcher 3D - Theme, wallpaper, Secure, Efficient, 5.0.3, 2017-09-19, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13107
PUBLISHED: 2018-08-15
Live.me - live stream video chat, 3.7.20, 2017-11-06, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13108
PUBLISHED: 2018-08-15
DFNDR Security Antivirus, Anti-hacking & Cleaner, 5.0.9, 2017-11-01, Android application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13100
PUBLISHED: 2018-08-15
DistinctDev, Inc., The Moron Test, 6.3.1, 2017-05-04, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.
CVE-2017-13101
PUBLISHED: 2018-08-15
Musical.ly Inc., musical.ly - your video social network, 6.1.6, 2017-10-03, iOS application uses a hard-coded key for encryption. Data stored using this key can be decrypted by anyone able to access this key.