Feeds

Sysadmins forced to CLEAN UP after bosses WATCH SMUT at work

Security dunces in the C-suite handing IT all sorts of sticky problems

The Power of One eBook: Top reasons to choose HP BladeSystem

Oops: according to a malware study from ThreatTrack Security, “visiting a pornographic Website” is one of the top four reasons that companies' “senior leadership team” members cop malware infections.

The study talked not to the victim companies, but to 200 malware analysts that had worked for infected companies. They found that in spite of their customers complaining about a lack of security resources, executives were still happy to behave like complete berks when it comes to security, with the following common sources of infection:

  • Clicking on a malicious link in a phishing email (56 per cent)
  • Attached an infected device to a PC (47 per cent)
  • Allowing a family member to use a company-owned device (45 per cent)
  • Visiting a pornographic website (40 per cent)
  • Installing a malicious mobile app (33 per cent).

If that sounds like the C-suite's been fishing in the shallow end of the gene pool, it gets worse. In spite of data disclosure laws in America, the study found that “more than half of the malware analysts surveyed said they have investigated or addressed a data breach that the company did not disclose to customers, partners or other stakeholders”.

Let's just check that again: executives do dumb things that compromise network security, and resist disclosing that they did dumb things that compromised network security...

Most companies – more than 86 per cent – responding to the study have an incident response team, which is a good thing considering the varied and stupid ways the net-sec bods have to defend against their executives' stupidity.

While the analysts are either confident or boastful about their capabilities, with 45 per cent saying they could analyse a malware sample in between one and two hours, two-thirds of the respondents also put the “complexity of attacks” as one of their two greatest challenges (alongside the volume of attacks). ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.