Doing so is easy: anyone can readily learn the names of supervisors by looking them up on LinkedIn and can then spoof an e-mail address. For instance, hackers can trick an organization’s employees by sending an e-mail that looks like it’s coming from one of their supervisors. Many break-ins to company databases occur less by technological wizardry and more by con artistry. Hackers know that humans are the weak link. Over and over, people fall for phishing scams, fail to patch vulnerable software promptly, lose devices containing vital data, misconfigure servers or slip up in any number of other ways. The main plotline of so many data breach stories is human error. Only when we learn from these recurring stories can we make headway in stopping the cycle. Countless stories involve organizations that spent a ton of money on security and still ended up breached. Common plotlines include human error, unnecessary data collection, consolidated storage and careless mistakes. Like Phil eventually managed to do, we must examine the recurring elements that allow data breaches to happen and try to learn from them. While Phil eventually figured out how to break the loop, we’re still stuck: the same types of data breaches keep occurring with the same plot elements virtually unchanged. Phil’s predicament sounds a lot like our cruel cycle with data breaches.Įvery year, organizations suffer more data spills and attacks, with personal information being exposed and abused at alarming rates. In the classic comedy Groundhog Day, protagonist Phil, played by Bill Murray, asks “What would you do if you were stuck in one place and every day was exactly the same, and nothing that you did mattered?” In this movie, Phil is stuck reliving the same day over and over, where the events repeat in a continual loop, and nothing he does can stop them.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |