The Weakest Link in Your Network

Contributed by Randall Miller

In this paper I will show how users are the weakest link in the security of company networks. I will examine some of the poor practices that are employed by users and how they make the network vulnerable to attacks. Some of these practices will include password management, Bring Your Own Device (BYOD), authorized access, social engineering vulnerabilities, etc. This paper will also provide some details on the specific attacks and methods used by hackers to gain access. Real world examples and case studies will be presented in order to demonstrate the seriousness of this issue. I will also include some suggestions and recommendations as to what companies can do to mitigate these attacks. Since the weakest link is indeed the human aspect, most of the mitigation will involve what can be done to improve user behavior such as user awareness training and the implementation of policies and procedures.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet