{"id":198,"date":"2008-11-27T00:00:00","date_gmt":"2008-11-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/11\/27\/human-error-is-the-no-1-it-security-issue-for-uk-companies\/"},"modified":"2021-12-30T11:36:43","modified_gmt":"2021-12-30T11:36:43","slug":"human-error-is-the-no-1-it-security-issue-for-uk-companies","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/11\/27\/human-error-is-the-no-1-it-security-issue-for-uk-companies\/","title":{"rendered":"Human error is the No 1 IT security issue for UK companies"},"content":{"rendered":"<p>No matter how many policies and training schemes you put into operation, basic human error still poses the most likely threat to your company&#8217;s IT security according to IT directors.  86 percent of all IT directors polled believed that the most likely cause of an IT security issue came from their own employees.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Following the survey, Clavister has called into question current IT security products and policies and asks what companies can do to address flaws that are integral to us all as human beings.<\/p>\n<p>&#8220;The purpose of a security policy is rather simple &#8211; to keep malicious users out of a network while monitoring potential risky users within an organization.&#8221;  Rather than write this off as an issue too broad to address, Clavister has developed a set of six recommendations for companies to consider.<\/p>\n<p>1. Design the policy so that it\u2019s easy to read and understand<br \/>\n2. Educate the users about the policy<br \/>\n3. Enforce consequences<br \/>\n4. Make it easy to do the right thing<br \/>\n5. Dictate a hierarchy of access permissions<br \/>\n6. Monitor &#038; improve<\/p>\n<p>http:\/\/www.continuitycentral.com\/news04297.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-198","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/198\/revisions"}],"predecessor-version":[{"id":2685,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/198\/revisions\/2685"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}