{"id":1764,"date":"2004-08-05T00:00:00","date_gmt":"2004-08-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/05\/you-are-still-the-weakest-security-link\/"},"modified":"2021-12-30T11:39:56","modified_gmt":"2021-12-30T11:39:56","slug":"you-are-still-the-weakest-security-link","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/08\/05\/you-are-still-the-weakest-security-link\/","title":{"rendered":"You are still the weakest security link"},"content":{"rendered":"<p>Yet again staff have been identified as the biggest security threat to business IT systems, in a survey released today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The poll of 1,240 British businesses found employee misuse of technology topping the reasons for security breaches, with 50 per cent of businesses having problems.<\/p>\n<p>The second highest cause, at 45 per cent, was poorly updated antivirus software.<\/p>\n<p>Only 18 per cent of organisations attributed problems to their own security policies.<\/p>\n<p>The survey kicks off a year-long education campaign aimed at British business by security vendor McAfee, involving seminars and guide books aiming to inform on best practice.  &#8220;Business perceives humans as the weakest link in security,&#8221; explained Sal Viveros, SME director for McAfee.  &#8220;Companies aren&#8217;t taking the initiative to educate employees about the risk of certain activities, like file sharing with peer-to-peer [P2P] software.  It&#8217;s a duty of every company to make sure their IT environment is safe for its employees and others to access.&#8221;<\/p>\n<p>Although 75 per cent of companies have put procedures in place, two thirds of them believe staff have downloaded music and over half believe the same for instant messaging applications or multimedia software.<\/p>\n<p>Professor Neil Barrett, who teaches IT security at Cranfield University, has firm views on such applications.  &#8220;Any company with employees running P2P software is at risk,&#8221; he warned.  &#8220;People shout and scream about applications like instant messenger being security threats but anything that, by design, downloads unchecked software onto a work PC is just an atrocious security risk.&#8221;<\/p>\n<p>The survey also found that less than half of those surveyed were using any kind of anti-spam technology, and less than a quarter had intrusion prevention systems in place.<\/p>\n<p>http:\/\/www.vnunet.com\/news\/1157129<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1764","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1764"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1764\/revisions"}],"predecessor-version":[{"id":4251,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1764\/revisions\/4251"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}