Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:it-security:blog:awareness [2023/11/16 20:19] – Automatic translation 135.181.138.9 | en:it-security:blog:awareness [2024/08/02 12:33] (current) – psycore | ||
---|---|---|---|
Line 1: | Line 1: | ||
~~NOTOC~~ | ~~NOTOC~~ | ||
+ | {{tag> | ||
====== The importance of awareness in IT security ====== | ====== The importance of awareness in IT security ====== | ||
===== Introduction ===== | ===== Introduction ===== | ||
- | {{ it-security: | + | Phrases such as "it was the stupid user's fault" or "end users are just too stupid" |
+ | |||
+ | {{ it-security: | ||
===== Errors in IT security management ===== | ===== Errors in IT security management ===== | ||
- | A large focus is often placed on technical security solutions. High costs are incurred in order to integrate technically complex software into the company. Then you feel safe, but wake up one morning to find that, despite all the technology, you have been [[it-security: | + | A large focus is often placed on technical security solutions. High costs are incurred in order to integrate technically complex software into the company. Then you feel safe, but wake up one morning to find that despite all the technology, you have been compromised. |
- | ==== What happened? ==== | + | ==== What has happened? ==== |
- | Despite all the technical measures, the network was compromised. | + | Despite all the technical measures, the network was compromised. |
=== Old attack methods === | === Old attack methods === | ||
Line 28: | Line 30: | ||
^ Technology ^ Process ^ People ^ | ^ Technology ^ Process ^ People ^ | ||
- | | [[it-security: | + | | [[wpde> |
In our case, no emphasis was placed on awareness or sensitisation, | In our case, no emphasis was placed on awareness or sensitisation, | ||
Line 39: | Line 41: | ||
---- | ---- | ||
- | [[https:// | + | [[https:// |