http://www.forbes.com/technology/2007/08/30/behavior-employees-vulnerable-tech-cx_ag_0830secure.html
http://www.forbes.com/2007/08/30/behavior-employees-vulnerable-tech-cx_ag_0830secure_slide_2.html?thisSpeed=25000
Raise of hands…or mouse clicks…
Have you ….
borrowed wifi
Used USB drives
Forwarded email to a web mail account
Opened email attachments
Clicked hyperlinks in emails
surfed on shady sites
Not secured wireless devices
Yes – with the owners permission and with everything tunneled over ssh.
Yes – my own drives.
Yes – to provide Web-mail reflection of a non-Web accessible mailbox.
Yes – to actually do work and to stop abusing e-mail with formatting.
Yes – again to stop abusing e-mail with attachments.
Yes – for malware education, filter testing and DNS testing. Yay for OpenDNS.
Yes – to provide WiFi hotspot access. Helps to drop a well configured firewall between the AP and the wired network.
Gosh, I must be really insecure!