7 Deadly Sins That Get Users Hacked7 Deadly Sins That Get Users Hacked
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
April 16, 2015
Already have an account?
Common knowledge has it that users are the weakest link in the IT risk management world—particularly negligent or uneducated users. But how exactly are the bad guys taking advantage of this ignorance or lack of care to break into users' endpoints and corporate accounts? Many of their methods involve just a little bit of psychological sleight of hand because phishing and social engineering tend to play a part in most attacks. Here are some of the worst ways users make themselves open to the onslaught.
Â
About the Author
You May Also Like
Shifting Left: DevSecOps in the Cloud
Feb 4, 2025Uncovering Threats to Your Mainframe & How to Keep Host Access Secure
Feb 13, 2025Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025