Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

How Hackers Are Getting Inside Help

How Hackers Are Getting Inside Help

There are more people today aware of the security risks they expose themselves and their companies during their regular internet activities than there have ever been before. The media has made it clear to all internet users just how often and easily their online privacy is threatened and each time some of the best and most common security measures have been detailed. And yet many of the same users that do feel threatened will ignore the most basic security features just to enjoy the fun of online shopping.

According to a survey by ISACA, non-profit IT association, 90% of the people who need to use a PC, laptop or tablet for their work are aware of the dangers that an online persona poses but they and more than half believe that the biggest threat comes from corporations that are desperate to get at their personal, product interest data. With that being the case you would expect that most people would at least try to respect their company’s security settings but that is not the case.

They study looked at how much people enjoy their online line shopping rituals by examining the threats they are willing to face. The most impressive statistic from the report is that 65% of all respondents do not verify the security settings of online shopping sites. That means they are not only endangering their privacy but also their financial security is severely questioned.

Another aspect about online security that the survey looked at was how many people use their work devices for personal online surfing. And while the good news is that we all seem to be doing it 37% of us say that they will spend 2 days during work hours for holiday shopping this year. Of course, dealing with that is at the discretion of the individual managers but the simple fact of spending so much time and sharing so much of your personal data on unsecured shopping networks does bring an increased security risk.

What is even more significant is that there are quite a large percentage of users who endanger more than just their own security but their company’s security as well. There are two basic ways in which this happens: one only poses a risk to the company and to themselves from a privacy point of view and the other one is actually posing a security threat.

From a private data point of view 36% of interviewed people have admitted to accessing social networks sites from their work computers and 19% used their work email address for online shopping. In themselves none of these actions pose very big security threats but they do put out just that little bit more personal information.

However the real security threats come from those 12% of respondents that store work related passwords on their personal computers, thus completely bypassing any security arrangements a company may have made. And there are also another 11% who have used a cloud storage service like Dropbox or Google Drive for their work related documents.

By Luchi Gabriel Manescu

About Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.


(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…