Attackers
are constantly looking for areas to exploit. This may be from poor coding,
newly found vulnerabilities, USB dropped at the target’s work site, and other
areas that may prove to be fruitful for the attacker. This continues
unfortunately.
The
continued focus continues to be the users and specifically their lack of impressiveness
with information security. In previous studies, college students were offered a
nominal trinket in exchange for their password. The college students at a
significant rate provided their ID and password. When a person is offered some
form of consideration, there is a tendency to feel obligated to return the
favor. This simple manipulation continues to be successful on various levels.
A
recent glaring example of this occurred with a study performed by the
University of Luxembourg (Nelson, 2016). The persons were approached on the
street, asked for their password while given a chocolate, and then asked for
their opinion on information security. By simply asking a question and offering
a chocolate, 44% of the subjects provided their private, confidential password
and the path to their personal data.
This
recent research study exemplifies the ongoing issue of the users not
appreciating information security or its far reaching effects. There continues
to be the need for continued education and training. Even Mark Zuckerberg’s
password for twitter and pinterest, prior to being hacked, was not complex at
dadada (McMillan, 2016).
Users
still unfortunately view information security as an inconvenience, until their
identity is stolen. At this junction, users and consumers then begin to think
back to what they may have done to allow this. The security community still
needs to provide real world application of what has happened to others in the
corporate world and what someone could do with the information in place online
of their own volition into social media. The days of the annual information
security meeting with the bland power point slides showing data have passed.
The users need to be engaged during the training to increase the potential for
them to remember and utilize the methods needed to lower the risk.
References
McMillan,
R. (2016, June 6). Mark zuckerberg’s twitter and pinterest accounts hacked.
Retrieved from www.wsj.com/articles/mark-zuckergers-twitter-and-pinterest-accounts-hacked-1465251954
No comments:
Post a Comment