About Us tem vaca na moita tem vaca na moita Of All Categories Academics, Arts, Autos, World & Business, World News, Business & Finances, Consulting, Entrepreneurship, Politics, Career & Jobs, Computers, Education & Training, Entertainment, Celebrities, Movies, Music Television, Food & Drink, Games, Gaming News, Nintendo Wii,PC Games, PlayStation Xbox 360, Health & Fitness, Home & Garden, Humor, Law & Legal, Lifestyle, Fashion, Marketing, SEO, Mobile, Personal, Parenting, Relationships, Pets, Photos, Real Estate, Recreation & Sport, Religion, Science, Shopping, Sports, Baseball, Basketball, Extreme, Football, Golf, Hockey, Motorsport, Soccer, Tennis, Technology, Tech News, Apple, Blogging, Design, Gadgets, Hardware, Internet, Linux/Unix, Microsoft, Programming, Security, Software, Web 2.0, Wireless, Web Hosting, Travel, Video Blogs, Writing, Wallpaper.

Monday, October 31, 2011

Security: Humans are always the weakest link

Good article in today's Wall Street Journal describing the weakest link in the information security chain. The summary? You can have your firewalls, your intrusion prevention systems, your endpoint security systems, your anti-virus, your spam filters, your zero-day detection appliances, your application-aware firewalls, and the rest.

But then there's this:

Chris Patten called a large investment-management firm to report that he was going through a divorce and was worried that his wife had set up an account under a false name.

And with that story—entirely plausible but in this case a lie—a customer-service representative turned over customer account numbers and other details with a readiness that makes banks and other companies cringe.

Mr. Patten, a 35-year-old cybersecurity expert who was with the U.S. Air Force before he started working for a consulting firm in Kansas City, Mo., didn't actually use or sell the data, which he gathered in running a test for the investment firm of its security arrangements. But the ease with which the employee was persuaded to divulge the information points to a troubling trend, security experts and law enforcement officials say.

As banks and other large companies spend large amounts of money on building firewalls and using complex technology to fortify their systems, it is often their own employees who are letting identity thieves in the door...

User education and awareness are good starting points. And solid browsers that can help point out phishing attempts certainly help.

But the fact remains: social engineering is just too damn easy and there's no silver bullet. What's that old quote? "Make it idiot-proof, and someone will make a better idiot."


No comments:

Post a Comment

Search This Blog

Loading...
Preview on Feedage: tem-vaca-na-moita Add to My Yahoo! Add to Google! Add to AOL! Add to MSN
Subscribe in NewsGator Online Add to Netvibes Subscribe in Pakeflakes Subscribe in Bloglines Add to Alesti RSS Reader
Add to Feedage.com Groups Add to Windows Live iPing-it Add to Feedage RSS Alerts Add To Fwicki
Add to Spoken to You
Entertainment Powered by Mysiterank Dr.5z5 Open Feed Directory Feedage Grade B rated

Blog Archive