<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MRFNVD" height="0" width="0" style="display:none;visibility:hidden">

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Soha Blog

The Vulnerable End User

[fa icon="calendar"] Oct 29, 2015 10:46:30 AM / by [email protected]

Throughout enterprises large and small, a very real (although often overlooked) threat to the security of an organization lies within the confines of their 4 walls…the end-user. This is not to say that end-users are the root of all-evil, far from it. They are the heart and soul of your company, they make sure your business runs smoothly and effectively; however, these same end-users are also a prime target. With a wide array of cybercrime opportunities such as phishing, watering hole attacks and other social engineering tactics which do not necessarily rely on sophisticated malware or technical vulnerabilities, but rather the prey on the mindset and behavior of people, an uneducated or careless employee or an overcomplicated procedure can result in sensitive information leaking and potentially falling into the hands of an attacker.

As cloud adoption and mobility efforts are rapidly rising, methods in which to access corporate resources and data (and the devices used to access them) have increased at an exponential rate. Left unchecked, this ubiquitous style of access can soon evolve to an unmanageable state and introduce far more risk due to the inherent complexity. When factoring in the Human Element, it is becoming more and more evident that people matter just as much as technology. If organizations are to successfully (and consistently) mitigate these risks across multiple planes, it is imperative that Security teams move beyond only focusing on the technological controls and begin to develop a culture of security-aware employees who can effectively act as an extension of your security program, rather than a threat to the organization.

Topics: Blog

mark@soha.io

Written by [email protected]