How insecure are you?

http://www.forbes.com/technology/2007/08/30/behavior-employees-vulnerable-tech-cx_ag_0830secure.html
http://www.forbes.com/2007/08/30/behavior-employees-vulnerable-tech-cx_ag_0830secure_slide_2.html?thisSpeed=25000
Raise of hands…or mouse clicks…

Have you ….


  • borrowed wifi
  • Used USB drives
  • Forwarded email to a web mail account
  • Opened email attachments
  • Clicked hyperlinks in emails
  • surfed on shady sites
  • Not secured wireless devices

One Thought on “How insecure are you?

  1. Yes – with the owners permission and with everything tunneled over ssh.
    Yes – my own drives.
    Yes – to provide Web-mail reflection of a non-Web accessible mailbox.
    Yes – to actually do work and to stop abusing e-mail with formatting.
    Yes – again to stop abusing e-mail with attachments.
    Yes – for malware education, filter testing and DNS testing. Yay for OpenDNS.
    Yes – to provide WiFi hotspot access. Helps to drop a well configured firewall between the AP and the wired network.

    Gosh, I must be really insecure!

Post Navigation