11
Make Them Your Biggest Ally
undocumented or unconventional ways of using software which can sometimes cause unexpected results. Also I.T. users are at risk of
generating incidents simply because they require elevated privileges to complete their tasks, so it is
“
Many ordinary users fear straying outside the boundaries of a rigid set of instructions for using a particular program
important to encourage a culture in which it is better to ‘fess-up human errors than sweep them under the carpet of ‘cover up’.
Social networking is a key subject area in the security awareness presentations simply because we cannot ignore that fact that users now see the work/life mix as a very blurred line and the long hours that many of our users work mean that attempting to limit social networking to core business hours is a fruitless operation, but it is important to educate employees that ‘private’ postings on social networking sites can cause reputational damage - to themselves or the company they work for. The ‘Facebook Friend in Peril’ scam is used to illustrate how scammers use social networking to fool gullible ‘friends’ into sending
money to Internet miscreants.
developed a global poster campaign for all coffee areas - all posters are translated into local languages as well as English to highlight the importance of the poster messages and they have been well received. Some languages proved a challenge - Taiwanese and Arabic were particularly difficult for those of us who struggled with ‘O’ Level French!
” Martyn Styles
Information Security Team Leader Allen & Overy LLP
Martyn will join the Keynote panel on Tuesday 19th April at 13.45 for the session: Don’t Forget The Users – How To Make Them Your Biggest Ally
Understanding the downsides of social networking will help users utilize its power whilst taking sensible security decisions when using the sites. To emphasise some of the key security messages, we also
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43