Absolve Security
  • Home
  • Blog
  • Why Absolve Security?
  • Services
  • About Us

Setup for Success?

6/28/2016

4 Comments

 
This morning I was reading The Role of Human Error in Successful Security Attacks.  As I read it, I found myself feeling empathy for the employees who are the targets of such attacks. For example, "These tools can also prevent users from engaging in inappropriate behavior, such as sending documents home via email or placing them on file-sharing sites or removable media such as USB sticks. " I can just see an employee sitting at their desktop at work, realizing that they have to go pick up their son from daycare right now, but their project is due tomorrow. Of course they are going to take it home via personal email or USB stick if that's the only way they can work on it from home. You can't leave a small child home sleeping while you go back to work, and missing the deadline could have significant career consequences.
Being in the field for many years now, I often see us security experts espousing guidance that makes running the business difficult. Certainly some tradeoffs are necessary, but people will work around any security boundary that makes it hard or impossible to do their job. We hire amazing scientists, recruiters, engineers, marketing professionals and the like, and then suddenly expect them to be security experts and produce results in the same time frames and at the same quality levels even as we put security hurdles in their way.

Is there a way to enable our people to focus on doing what they are amazing at, without unacceptable security risks? Can we make doing the secure thing the path of least resistance? In this blog I'll be exploring common social engineering issues, and ways we might alter the system to increase protection without impeding the business.
4 Comments
bestessay uk link
12/19/2016 09:25:06 pm

yeah right. we should do what we want and what we can do in better way. if we do not have interest in any thing we should not do that and should not choose that as a profession.

Reply
go to this web-site link
1/16/2017 03:49:31 pm

Free Proxy Servers are used for anonymous browsing. Most common usage of free proxy server is to bypass the college/office or any other place's security restrictions and access unrestricted sites. But proxy servers should be used with caution.

Reply
bestessays.com link
2/1/2017 04:40:14 am

I should read this article too! This topic is quite interesting for me.

Reply
rushmyessay services link
2/3/2017 07:05:08 pm

I've read also The Role of Human Error in Successful Security Attacks by Fran Howarth and according to research by Federal Computer Week cited in a recent Vormetric report, the greatest impacts of successful security attacks involving insiders are exposure of sensitive data, theft of intellectual property and the introduction of malware. I agree with you and I pity those employees who are the targets of the attack by using their weaknesses provide them with access to sensitive information.Best way to avoid this kind of incident is that avoid sending important documents to unintented recipients, avoid placing documents on file-sharing sites or in the USB sticks to prevent it from falling into the wrong hands.

Reply



Leave a Reply.

    Author

    Absolve Security focuses on designing systems and processes to reduce social engineering while empowering the business to focus on it's goals.  

    Archives

    July 2016
    June 2016

    Categories

    All

    RSS Feed

Site powered by Weebly. Managed by Hostmonster