Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: On the Insecurity of Corporate Life. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

On the Insecurity of Corporate Life
by possibly noteworthy at 11:25 am EDT, Sep 1, 2007

Hacker Jeopardy To Become Annual Corporate Training

Well, not really. But maybe something like it. (One can hope ...)

Author and prominent IT security expert Winn Schwartau has formed a nonprofit organization to provide cybersecurity certification programs for end-users.

The nonprofit has satellite offices in Old Hickory, Tenn., Hong Kong and London.

Can someone please explain the logic of a certification program for "self employed end users"? (Who are they trying to impress?)

Email junkies

According to a study, more than a third of office workers suffer from "email stress", with 34% saying they checked their email every 15 minutes.

Monitoring software showed they were seriously underestimating.

This latest study doesn't really show that we get too many emails. What it shows is that we're addicted to checking.

Accounting For Human Error

When the Anna Kournikova virus was spreading wildly in 2001, it infected millions of computers and clogged e-mail servers by offering a racy picture of the teen tennis star to unsuspecting e-mailers. Or, in some cases, not so unsuspecting.

"A big proportion of the infections we saw were coming from people who had actually gone out searching for the virus because they wanted to see Anna Kournikova," says David Perry, global director of education for Trend Micro. "We didn't see this happening two times. We saw it thousands of times."

Today, some security professionals say, enterprise computer users haven't gotten much savvier. Perry says he still sees as many as one in five virus infections coming from users who purposefully infect themselves out of curiosity, just one of the many practices that undermine information technology security with varying combinations of naiveté and carelessness. And as cyber-criminals become more sophisticated and networks more intricately connected, that human element leaves companies vulnerable to data leaks and intrusion in spite of billions spent on electronic


 
 
Powered By Industrial Memetics