Book now with code EOY2025
TechGuy215 wrote: » In my own experience, Encryption. Within the different companies I've worked for I've seen poor encryption standards, to some companies that have no enryption standards.
jvrlopez wrote: » You can imagine the sites and activity these users have at home, and when they bring in USB drives and plug them into work assets, it creates a nightmare.
5502george wrote: » LOL, my wife told me the other day that her company "x" which deals with nothing but HIPPA and PII just realized that there were regulations governing this type of data. They paid company "x" to implement email encryption to comply with regulation for a good penny! .....The funny thing is when they encrypted the emails the intended recipient could not open them ha ha ha
jvrlopez wrote: » Uninformed/inexperienced users. Always come across users downloading questionable software to try and do something outside their rights and access. That or they are just trying to do something in which they don't know the legitimate or safe way to do so. Most of the programs come from questionable sources and are packaged with other by products. You can imagine the sites and activity these users have at home, and when they bring in USB drives and plug them into work assets, it creates a nightmare.
ptilsen wrote: » It depends on the environment and what the organization's security needs are. I would argue for many, maybe most organizations, it's actually patching. Known exploits remain unpatched for far too long, sometimes indefinitely. Both client applications (especially browsers and browser plugins) and server applications sit unpatched and unprotected and make for an easy attack vector. I think this is the biggest gap because it's generally difficult to mitigate known exploits on services that are being used, and when things aren't being patched, what mitigation can be done probably isn't being considered. I don't think users are the biggest problem. Yes, training is critical, but it doesn't matter if the majority of what they use is inherently insecure regardless of how they use it, and in my experience (which has possibly just been bad, for lack of a better term) that's probably the case more often than not. Edit: Redz beat me to it. When anyone even approaching moderate skill can break in using GUI tools, pretty much every other measure being taken is for nought.
cisco_trooper wrote: » This is poor admins.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!