Cyber breaches, human error and negligence
Monday, 07 April 2025
(0 Comments)
Posted by: Ernest Roper
If one looks this up online, it is evident that there is research available indicating what percentage of cyber breaches are caused by human error or negligence. It seems to range from 88% to 95%, depending on the source you consult. Listed below are just a few causes of such breaches: Social Media Negligence In a recent incident, a high-ranking U.S Government official came under fire for inadvertently including a journalist on an online chat group in which sensitive information was shared. This is an indication of how a slip of the fingers on a cell phone or the pre-emptive loading of the wrong email address, can do proper damage. Proceed with caution when communicating private information. Use of weak passwords. It is often necessary to provide personal information such as a spouse's name, date of birth, etc. on various applications. While using simple passwords like your spouse’s name or your own birthday may be easy to remember, they can also be easily guessed by individuals who have access to your basic information. (It is advisable to create strong passwords that incorporate upper case, lower case and alpha numeric for enhanced security). Falling Prey to scammers Employees frequently become victims of scams perpetrated through the dissemination of malicious email links. They may inadvertently click on these links without recognizing their potential harm. In certain instances, personnel contribute to security vulnerabilities by unintentionally downloading harmful software or connecting devices whose security integrity might already be compromised. Not locking computers, smartphones and tablets This is a fundamental aspect of cybersecurity practices. Although the majority of individuals and organisations implement this measure for laptops, it is frequently overlooked for other devices. It is imperative to ensure there are no chances for an inquisitive person in a home office environment or an unfamiliar individual in a café to inadvertently access any device that contains business-related data. Trusting public Wi-Fi This issue is prevalent, particularly among employees who frequently travel. It likely stems from the intangible nature of network activities. For instance, it would be apparent if someone were physically reading over your shoulder; however, one cannot perceive another's monitoring within someone else’s IT infrastructure. Post-It notices Believe it or not this still happens. Pick up a keyboard in an office and you may find a conveniently “secret” password recorded. In today's world of high-tech hacking, corporate espionage and identity theft, the obvious is often overlooked. It’s up to all of us to exercise caution and practice common sense measures. Ernest Roper | Membership Manager
|