450+ experts on 30 subjects ready to help you just now
Starting from 3 hours delivery
Remember! This is just a sample.
You can get your custom paper by one of our expert writers.Get custom essay
121 writers online
The most common employee errors in the workspace that lead to security breaches
Employee might fall in a phishing scamAn employee will receive an email from fraudulent sources or from an individual hacker that tries to lure them to download malicious files or click on a link to an exploit-laden site. For example, the hacker can make phishing pages like Facebook, Gmail or some bank account login pages .were user can enter his login info and those pages will stay in web hosts and run some backend scripts which send user login information to the hacker.Recent cause:According to the 2016 Verizon Data Breach Investigations, 30% of these messages were opened and 13% of employees went on to open a malicious attachment or link.(Brown, 2016) Why stolen laptops still cause data breachesLosing any electrical devices or theft is the most likely breach method. i.e.., losing USB, Hard drives, laptop etc. This includes the service data compromising or erasing sensitive data. (Jonathan, 2016)
Privilege abuse:Privileged account abuse tops the list of the most dangerous threat patterns. It is relatively easy for insiders to steal sensitive data, but it can take organizations months or even years to detect and investigate such incidents. Most common scenarios Whether the threat actor is a disgruntled ex-employee or a staffer looking for financial gain, privilege abuse that leads to security breaches tends to conform to just a few patterns. By analyzing security incidents that made headlines over the past few years, we identified the four most common scenarios of how insiders can actually gain access to sensitive data:
Mistake #1: Assuming your developers are security experts:Unfortunately, when it comes to implementing encryption correctly—you don’t get a second chance. While a typical developer mistake might cause an error on a web page, a mistake in your data security pipeline can leave all of your sensitive data at risk. Worst of all, you won’t find out about the mistake for months or even years until your organization gets hacked. And by then, it’s too late.
Mistake #2: Relying on cloud providers to secure your dataThe physical infrastructure powering most cloud providers is secure and some even offer encryption options. However, they always recommend that developers encrypt their sensitive data before storing it in the cloud. Amazon Web Services (AWS) stress that data encryption is the customer’s responsibility, not theirs. (Yaron)Passwords:Cybercriminals find the path of least resistance to their target and today that path leads straight from users with self-managed ‘simple factor’ passwords. Since most recent breaches leveraged privileged credentials to gain access to the organization, securing privileged access in today’s hybrid enterprise is mandatory in achieving a mature risk posture. Passwords alone are not enough.
While most privilege solutions traditionally vaulted the credentials for shared accounts on-premises, password vaults alone do not provide the level of privileged access security required to stop the breach. Organization’s need is a truly integrated solution that combines password vaulting with brokering of identities, MFA enforcement and just-enough and just-in-time privilege, that secures remote access and monitors all privileged sessions.”(cso.com, 2017)Improper disposal of informationData breaches arising from theft, loss, unauthorized access/disclosure, improper disclosure, or hacking incidents involving personal health information continue to increase every year.
As of September 2013, reported breaches affecting individuals reached close to 27 million since 2009, when compilation of records on breaches began. These breaches, which involved 674 covered entities and 153 business associates, involved computer systems and networks, desktop computers, laptops, paper, e-mail, electronic health records, and removable/portable devices (CDs, USBs, x-ray films, backup tapes, etc.). Even with the increased use of health information technology by health institutions and allied businesses, theft and loss (not hacking) constitute the major types of data breaches encountered.(Wikina,2014)
We provide you with original essay samples, perfect formatting and styling
To export a reference to this article please select a referencing style below:
Where do you want us to send this sample?
Be careful. This essay is not unique
This essay was donated by a student and is likely to have been used and submitted before
Download this Sample
Free samples may contain mistakes and not unique parts
Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.
Please check your inbox.
We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!
Are you interested in getting a customized paper?Check it out!