Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Monday - Friday, 4-7 p.m.
In Depth with Francis Rose features daily interviews with top government executives and contractors. Listen live from 4 to 7 p.m. or download his archived interviews on our daily show blogs.
Weak link in cybersecurity: The human element
Friday - 7/8/2011, 6:25pm EDT
But one vulnerability is about the same today as it was at the down of hacking: the human element. Whether it's because we're in a rush, or we're naive, or we're just plain lazy, attackers know they can use various forms of what's sometimes called social engineering to use an organization's own employees against it.
Witness a test conducted by the Homeland Security Department earlier this year. They covertly scattered USB drives in agency parking lots to see what employees would do if they found them. According to Bloomberg News, 60 percent of the employees who found the drives plugged them into office computers. That figure went up to 90 percent if the drive had an agency logo on it.
Andy Purdy, chief cybersecurity strategist at Computer Sciences Corporation, discusses the USB hack and other ways hackers can find unwitting accomplices among an agency's own workforce.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.