{"id":1884,"date":"2006-08-08T00:00:00","date_gmt":"2006-08-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/08\/08\/workers-ignore-the-risks-of-web-links-and-attachments\/"},"modified":"2021-12-30T11:40:12","modified_gmt":"2021-12-30T11:40:12","slug":"workers-ignore-the-risks-of-web-links-and-attachments","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/08\/08\/workers-ignore-the-risks-of-web-links-and-attachments\/","title":{"rendered":"Workers Ignore the Risks of Web Links and Attachments"},"content":{"rendered":"<p>A recent security audit run by Finjan for a European organisation in the finance sector, usually one of the most security-savvy marketplaces, revealed that an overwhelming 67% of security policy violations discovered over a one week period were related to spyware downloads, attempts to access spyware websites or attempts to access websites that hide executable spyware.  Of those questioned 93 per cent said that they knew that links, attachments, pop boxes and web pages could have spyware or other forms of malicious code embedded within them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A survey into the habits of 142 UK office workers conducted by Finjan has uncovered that although they know the security risk to their employers caused by clicking on web-links or opening attachments from unknown sources, they simply can&#8217;t help themselves.<\/p>\n<p>http:\/\/www.it-observer.com\/news\/6646\/workers_ignore_risks_web_links_attachments\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1884","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1884"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1884\/revisions"}],"predecessor-version":[{"id":4371,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1884\/revisions\/4371"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}