CSO: 3 low-tech threats that lead to high-profile breaches
By Larry Ponemon
Dec 16, 2014
In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization's walls or public places.
Moving forward, we can expect to see a shift from hacking networks to a focus on hacking people. The tactics used to hack people are not highly sophisticated and can encompass relatively stealth threat vectors, making them hard to trace. It seems simple, but it’s important not to overlook the low-tech threats in our high-tech world.
Here are three threats that all IT professions should be aware of and take necessary steps to mitigate:
Click the URL above to read the full article
Votes:3