Community
One of my favourite TV programmes is "The Real Hustle" where a team of ex-confidence tricksters show how easy it is to use social engineering to gain access to other peoples' goods and money.
Of the three security areas that can be addressed, people, process and tools, people provide both the largest target and, due to reluctance to own up to being conned, the least likely to be discovered.
With the opening up of systems through b2c (business to consumer) and b2b (business to business), data is no longer isolated in a castle surrounded by a firewall "moat". Businesses need to understand not only the vulnerabilities of their own employees, to risks such as fraud, boredom, pride and revenge, but also those of their customers - as illustrated by this article on PIN sharing. Their suppliers also hold an increasing amount of company information, whether product sales figures (how tempting to the competition) or future strategy (ditto) through IT plans.
Mitigating the Risk
Whilst the risks will never completely disappear, there are some ways that the risk can be reduced:
This content is provided by an external author without editing by Finextra. It expresses the views and opinions of the author.
Ritesh Jain Founder at Infynit / Former COO HSBC
23 January
Perry Carpenter Chief Human Risk Management Strategist at KnowBe4
21 January
Todd Clyde CEO at Token.io
Oleg Chanchikov CEO at CapyGroup
20 January
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.