7 Deadly Sins That Get Users Hacked

How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data

Common knowledge has it that users are the weakest link in the IT risk management world—particularly negligent or uneducated users. But how exactly are the bad guys taking advantage of this ignorance or lack of care to break into users' endpoints and corporate accounts? Many of their methods involve just a little bit of psychological sleight of hand because phishing and social engineering tend to play a part in most attacks. Here are some of the worst ways users make themselves open to the onslaught.


Next slide
Recommended Reading:
Editors' Choice
Kirsten Powell, Senior Manager for Security & Risk Management at Adobe
Joshua Goldfarb, Director of Product Management at F5