home_banner `

Content Icon

End Users Are the Weakest Links in IT Security Defenses

August 1, 2018 | Content Aggregator - Single Slide | Security Awareness, Phishing, Social Engineering

More than a third of security professionals believe that end users who violate security policies are the weakest like in enterprise IT defenses. Another 18% blame a lack of security architecture and planning that goes beyond ”firefighting,” while 7 percent point to an overabundance of SIEM data.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Poll: Ways to Vet Suspicious Email Flagged by Users

How can a security team avoid becoming overloaded once end users are empowered to flag and report suspicious email? In this Viewpoints report, IANS Faculty Marcus Ranum, Kevin Beaver and Ondrej Krehel recommend several technology- and process-based solutions.

C-Level Executives Need the Most Security Training

More than half of CISOs believe C-level executives are most in need of security awareness training to protect themselves from phishing and other social engineering attacks. HR is seen as needing the least amount of security awareness training.

Overview of Russian Cyber Attack Tactics Targeting U.S. Utilities

In cyberattacks against U.S. power utilities, Russian hackers stole employee credentials to gain access to corporate systems using spear-phishing, targeted oft-visited trade publication websites and used VPNs to stay hidden and maintain network access.