O'Reilly logo

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices by Jeremy Wittkop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_6

6. The People Problem

Jeremy Wittkop

(1)Boulder, Colorado, USA

Amateurs hack systems, professionals hack people.

—Bruce Schneier

It is widely accepted that people are the weakest link in the security triumvirate of people, process, and technology. There is a general lack of awareness among the user community that leads to disturbing trends continuing, and even worsening in some cases. Examples of these trends include creating weak passwords, a lack of awareness of the value of their identity, clicking on links on e-mails, opening attachments from unknown senders, holding doors for people into secure areas, and a propensity to share information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required