I was reading a report the other day (The Evolution of Data-Centric Protection) from InformationWeek Analytics presented by Security Dark Reading (requires registration) and written by technology expert Joe Hernick.  The report includes a survey of 384 business technology decision-makers at North American companies and the purpose of the report was to determine the role of endpoint protection in enterprise data security strategies.  The opening line of the report was great: “Think sophisticated attackers are your biggest problem?  Our survey says clueless and malicious end users are more likely to stymie even the best-laid defensive plans.”  I have experienced and observed similar results for years,Read More →

You may have seen the scary story reporting investigators were able to carry liquid bomb-making materials past security at 10 federal building in 10 cities. Members of Congress blasted “disturbing” and “outrageous” security failures in the nation’s federal buildings.  According to the article, Sen. Joe Leiberman blamed the Federal Protective Service Security for failing to provide adequate security and proper training to its 13,000 security guards during a hearing earlier this week on Capitol Hill. The GAO report found that he Federal Protective Service is not doing enough to make sure it’s 13,000 guards are qualified and trained for their jobs – and doing whatRead More →

Lessons Learned continue to identify new and changing threats, but are organizational managers helping their organization’s personnel keep up with ongoing awareness or are they falling farther and farther behind? For example, a recent article highlighted an attack that hit Twitter and may be one of the first time hackers to use the micro-blogging site for profit.  So why do hackers love social networking? Because unaware users (Boards, management, employees, vendors, contractors, consultants, business partners, etc.) will click on interesting links to things like “Best Video” or “Funniest Video” and unknowingly end up on a Russian domain that serves up malware or other exploits thatRead More →