There are multiple ways in which insider threats can spill over into security breaches. Various studies indicate that user behaviour accounts for over 50% of information leaks. In Australia, the Office of the Australian Information Commissioner confirms that user error accounts for between 32 and 37 percent of all Notifiable Data Breaches in each of the four quarterly reports issued to date. These can further be broken down into threats which arise out of negligence and risks which arise out of criminal intent.
Just last month, we celebrated the 75th anniversary of D-Day. This historic occasion which brought about the end of World War Two also brings to mind one of history’s most ignominious failures: the Maginot Line. After investing millions in extensive fortifications, the French discovered that building thicker walls is no defence if the gate is left wide open.
Transcript: Trent: Welcome back, thank-you for joining us today I’m joined by a very special guest David Sia, CEO of Techware. Thanks for joining us Dave.
Got an email from the CEO requesting urgent payment of an invoice (or something similar)? Don’t rush in to get the job done, because you might just be participating in a clever new social engineering hack. In other words, that email might not be from the boss at all. Instead, you might have received an order from a hacker, to pay a hacker.
Trent: Welcome back to TechScoop, thankyou for joining us now today I am joined by an exceptionally special guest Mr Ryan Economos from Mimecast. Thanks for joiing us Ryan, good to see you again.