7 Deadly Sins That Get Users Hacked
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
Ericka Chickowski, Contributing Writer
April 16, 2015
8 Slides
Common knowledge has it that users are the weakest link in the IT risk management world—particularly negligent or uneducated users. But how exactly are the bad guys taking advantage of this ignorance or lack of care to break into users' endpoints and corporate accounts? Many of their methods involve just a little bit of psychological sleight of hand because phishing and social engineering tend to play a part in most attacks. Here are some of the worst ways users make themselves open to the onslaught.
About the Author
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
You May Also Like
More Insights