contact contact contact
ÊAdvertise
ÊContact
ÊSecurityWatch
Ê Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business

Cybercime: People the weakest link
Author: IT-Observer Staff
Thursday, 12 May 2005, 09:17 GMT

A recently publication of figures from the National Hi-Tech Crime Unit revealing that cybercrime is costing UK businesses 2.4bn a year, specialist fraud consultancy Detica has warned that irresponsible customer behaviour is frequently to blame rather than inadequacies in the technology.

David Porter, Head of Security and Risk at Detica comments: "In addition to technological solutions, companies will often throw extra security processes at the problem. But with security, more, paradoxically, can often be less. The more people who witness a road accident, the less likely one of them will call an ambulance. Similarly, the more people making additional security checks, the less thorough each person will be, each assuming others will spot the problem. And the greater number of safety checks you put in, the more risks people will take - just like seatbelts make people drive faster. It's all a question of careful, balanced design and not underestimating the potential for human fallibility."

Detica pointed out that businesses also need to concentrate at educating customers and employees about cybercrime and making them the first line of defense.

"Haste, ignorance, fear and greed are the weak spots that fraudsters are ready to exploit. Customers need to guard their personal details closely and think before blindly clicking on e-mail or website links or downloading attachments. They should also be cautious about disclosing too many identity details on websites aimed at forming or reuniting social contacts as this can hand identity fraudsters what they need on a plate,” Porter added.

Monday, May 23, 2005

Network Security

Hackers get tricky with pharming
Hiring a hacker? Think again, experts warn
Why security vulnerabilities expand beyond operating system, enterprise
How Dangerous Was The Cisco Code Theft?


Free VoIP Assessment for your business


Wireless Security

picoChip, Hifn unveil WiMAX basestation reference
Why wireless devices must be connected to critical appliations
Securing 'strange' Wi-Fi devices
IT giants fight wireless patent

InfoSec Directory

Phishing attacks and countermeasures
Overview of image security techniques with applications in multimedia systems
Inoculating SSH Against Address-Harvesting Worms
What is the point of encryption if you don’t know who for?


Free VoIP Assessment for your business


Press Releases

nCipher helps combat phishing attacks with Chip and PIN
LANDesk Named to 2005 Red Herring Top 100
HP Simplifies Business Protection for Small and Mid-size Businesses with New Smart Office Program
Clifford Chance appoints Redbus Interhouse to Provide Pan-European Services
ÊCopyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: PrivacyÊ
Site Meter

Ê