
149
Chapter 12
Protecting Us from Us
Human Firewall Vulnerability
Assessments
Ken M. Shaurette and Tom Schleppenbach
Organizations spend millions each year to defend and protect private data from compromise.
Intrusion prevention and detection systems and technology have become very sophisticated, and
hacking attempts have become equally advanced. ere is a continuous war being waged as the
average user plugs along, using Facebook, online banking, and Internet searches for genealogy
information or whatever hobby of interest.
Even with all the technology deployed and policies and procedures written, a consistent weak
link to data privacy continues to ...