IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Security is Responsibility of the User

8 October 2010 By Saran

We keep on talking about how important it is to build on security for our computer and our network but we fail to realize that it will ultimately lie on how responsible the assigned user will be when it comes to safeguarding his username and password as far as access to the computer or network is concerned. Apparently, there is always a human error in these cases and if we look at some news briefs, we will notice that majority of hacking or intrusion issues originate at the hands of one person.

This is not actually saying that an assigned user has the ability to control or have companies at the tip of his fingers. Remember, one act of illegal practice can be a cause for legal action. In fact, it is easier to uphold the law on such a person to safeguard the interest of a company. So either way, no person in his right mind would want to bear the burden of being sued and taken to court for something that was bestowed upon him with complete trust.

Hacking is one thing but divulging is another. This is a practice that should be corrected in most cases. People fail to realize the importance of their participation in a network. No matter how great a security barrier is against any outside intruders, security protection includes making sure that the trusted employee is indeed a reliable one. In short, cleaning up the bad vibes and potential threats start internally rather than external.

Filed Under: IT Security Basics, Network Security, Security Policies Tagged With: computer, legal action, network, password, security, username

End users’ behavior can cause security breaches

21 October 2006 By Saran

Crystal_Clear_filesystem_folder_locked.png

Most security specialists say that though hackers and phishers are their primary enemies, the ones doing the most damage to their system are the end users. End users may inadvertently let malware on their computers by clicking an attachment or entering an untrustworthy site, but no matter how many times they’re warned and educated about these threats they go on doing the same things.

An article in Dark Reading compiled by their staff lists down ten of the most dangerous behaviors end user do that could compromise the security. Though this isn’t the first list ever made about this issue (nor will it be the last) the themes it had in common with a few other lists I found were:

  • Visiting, downloading and installing freeware from sources you’re not sure of. No one would admit it, but chances are users will find a way to visit gambling and porn sites even if they’re banned. They just look for one that’s currently not in the banned list. Music and game downloads sites can also house unseen code that can exploit the computer.
  • Disabling the very same security precautions intended to keep you safe. This is especially true for firewalls, anti-virus software, and WiFi connections. Some might find their connection speed lowered by constant reminders of security precautions like password changes, patch updates, and automated virus updates.
  • Password precautions. End users may be sharing their passwords with friends and family, increasing the risks of security breaches. Some, for the sake of remembering them easily, use dictionary words and jot them down or save them in their mobiles.
  • Clicking on links and attachments from friends and even perfect strangers. It’s only too true that most people click before checking if a link’s legitimate or not, especially for phishing e-mails. And even links from friends on an instant messenger service can be a scam to deliver trojans to your computer.

[tags]dangerous things to do online, list, security, password[/tags]

Filed Under: IT Security Basics, Real-World Issues Tagged With: dangerous-things-to-do-online, IT Security Basics, list, password, Real-World Issues, security

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security