© Jeremy Wittkop 2016

Jeremy Wittkop, Building a Comprehensive IT Security Program, 10.1007/978-1-4842-2053-5_6

6. The People Problem

Jeremy Wittkop

(1)Boulder, Colorado, USA

Amateurs hack systems, professionals hack people.

—Bruce Schneier

It is widely accepted that people are the weakest link in the security triumvirate of people, process, and technology. There is a general lack of awareness among the user community that leads to disturbing trends continuing, and even worsening in some cases. Examples of these trends include creating weak passwords, a lack of awareness of the value of their identity, clicking on links on e-mails, opening attachments from unknown senders, holding doors for people into secure areas, and a propensity to share information ...

Get Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.