First off, apologies to the original author of this content… I had tucked this away in an Outlook note probably 8 years ago (I’ve updated it a little as it references modems, thankfully of which, I haven’t touched one in nearly that long). I didn’t note the author at the time and if they want to contact me, I’d be happy to reference their work. It is still applicable today.
THE FIVE WORST SECURITY MISTAKES END USERS MAKE
-
Opening unsolicited email attachments without verifying their source and checking their content first.
-
Failing to install security patches, especially Windows, MS Office, IE (and other web browsers).
-
Installing Screen Savers or games without safety guarantees.
-
Not making and testing backups.
-
Connecting a wireless router/access point to the local network without securing it (or seeking permission)
THE SEVEN WORST SECURITY MISTAKES SENIOR EXECUTIVES MAKE
-
Assigning untrained people to maintain security and providing neither the training nor the time to make it possible to learn and do the job.
-
Failing to understand the relationship of information security to the business problem – they understand physical security but do not see the consequences of poor information security.
-
Failing to deal with the operational aspects of security: making a few fixes and then not allowing the follow through necessary to ensure that problems stay fixed.
-
Relying primarily on a firewall.
-
Failing to realize how much money their information and organizational reputations are worth.
-
Authorizing reactive, short term fixes so problems re-emerge rapidly.
-
Pretending the problem will go away if they ignore it.
THE TEN WORST SECURITY MISTAKES INFORMATION TECHNOLOGY PEOPLE MAKE
- Connecting systems to the Internet before hardening them (removing unnecessary devices and patching necessary ones).
- Connecting test systems to the Internet with default accounts and passwords.
- Failing to update systems when security vulnerabilities are found and patches or upgrades are available.
- Using telnet and other unencrypted protocols for managing systems, routers, firewalls and PKI (Public Key Infrastructure).
- Giving users passwords over the phone, or changing passwords in response to telephone or personal request when the requester is not authenticated.
- Failing to maintain and test backups.
- Running unnecessary services, especially FTP, TELNET, SMTP and RPC
- Implementing firewalls with rules that allow malicious or dangerous traffic – incoming or outgoing.
- Failing to implement or update virus detection software.
- Failing to educate users on that to look for and what to do when they see a potential security problem.