Non-technical people are favorite targets for malicious hackers, from data dealing crime rings to targeted corporate espionage attacks.
As we've seen in far too many recent instances where difficult, large targets have been infiltrated and bled from within over a period of time, sometimes all it takes is one person clicking the wrong thing at the right time.
Oftentimes, these fateful entry points are created by people who have no idea what's going on; non-technical employees (or even executives) who serve as an unwitting vector for exploitation.
You can't make every employee tech-proficient, and that's troubling in an era where attacks are constant, and enterprise security endures some profound cloud, infosec hiring, and BYOD growing pains.
What you can do is learn the top ways malicious attackers exploit your weakest links, as described on each of the following pages.
<a href="http://www.zdnet.com/hacked-the-six-most-common-ways-non-tech-people-fall-victim-7000034743/"> Link to Full Article </a>
The FBI isn't happy with recent decisions by Apple and Google to secure communications by default, saying it could lead to "a very dark place." That was the gist of a recent talk by director James Comey, who expressed frustration at the inability of law enforcement to keep up with technology. Both tech giants recently said they'd encrypt devices by default, meaning even the companies themselves can't access photos, emails or other data on your device -- let alone law enforcement. Comey also complained that there are now too many message and calling tools for the FBI to keep up with, and many companies are unable or unwilling to give backdoor access. He cited several cases in which phone data helped law enforcement crack cases, but during a Q&A, couldn't cite a single example of how encrypted data hindered it.
e year draws to a close, it's time for many organizations to start planning their IT budgets for 2015. With that in mind, Tech Pro Research surveyed IT professionals around the world to find out if next year's budgets will be more or less than the current year, and what they'll be spending the money on.
The resulting report, Tech Pro Research's 2015 IT Budget Trends, identified some interesting trends around who creates the IT budgets and how they're approved. Many companies are feeling better about the economy and spending more, but they have to work harder in order to justify budget requests to get funds allocated.
Many respondents reported that IT is seen as equal to or more important than other business units within their company, and that IT budgets for 2015 will be the same, or higher, than in 2014 for eight out of ten organizations.
HP's home-focused and business divisions have frequently seemed at odds with each other, and apparently the company agrees. The Wall Street Journalclaims that the tech giant is about to split into two companies, one focused on PCs and the other dedicated solely to corporate hardware and services. If the report is accurate, the separation could be announced as early as Monday. The exact reasoning behind the move hasn't been mentioned, but the PC-centric group would be headed by one of its existing executives, Dion Weisler; current CEO Meg Whitman would run the business group and keep an eye on the other company by serving as its chairman of the board. However true the rumor may be, such a move wouldn't be all that surprising -- much of the computing industry has been restructuring and rescaling to cope with a world where the PC's role is rapidly evolving.
Somehow there always seems to be another Internet security disaster around the corner. A few months ago everyone was in a panic about Heartbleed.
Now the bug, Shellshock (officially CVE-2014-6271), a far more serious vulnerability, is running uncontrolled over the Internet. It's never a good time to panic, but if you're discouraged I don't blame you; I know I am.