Weak link in cybersecurity: The human element

Whether it\'s because we\'re in a rush, or we\'re naive, or we\'re just plain lazy, attackers know they can use various forms of what\'s sometimes called social...

As threats to the security of government and corporate IT systems keep advancing and getting more sophisticated, computer security experts are doing their best to keep up. and develop technological solutions to keep malware and viruses out of our systems.

But one vulnerability is about the same today as it was at the down of hacking: the human element. Whether it’s because we’re in a rush, or we’re naive, or we’re just plain lazy, attackers know they can use various forms of what’s sometimes called social engineering to use an organization’s own employees against it.

Witness a test conducted by the Homeland Security Department earlier this year. They covertly scattered USB drives in agency parking lots to see what employees would do if they found them. According to Bloomberg News, 60 percent of the employees who found the drives plugged them into office computers. That figure went up to 90 percent if the drive had an agency logo on it.

Andy Purdy, chief cybersecurity strategist at Computer Sciences Corporation, discusses the USB hack and other ways hackers can find unwitting accomplices among an agency’s own workforce.

This story is part of Federal News Radio’s daily Cybersecurity Update. For more cybersecurity news, click here.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    Amelia Brust/Federal News NetworkGSA, federal buildings, real estate

    Agencies’ headquarters in DC remained ‘nearly empty’ in 2023, real-estate board finds

    Read more
    Graphic By: Derace LauderdaleReturn to office vs Telework

    Survey: Feds question the ‘why’ behind return-to-office push

    Read more
    (Getty Images/iStockphoto/lukutin77)cloud shape from lines symbol of cloud technology, concept of information technology illustration

    Protected: Cloud native in the government: Challenges and opportunities

    Read more