Return-Path: <sentto-279987-4825-1023971675-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 13 Jun 2002 05:36:08 -0700 (PDT) Received: (qmail 4896 invoked by uid 510); 13 Jun 2002 12:34:48 -0000 Received: from n5.grp.scd.yahoo.com (66.218.66.89) by all.net with SMTP; 13 Jun 2002 12:34:48 -0000 X-eGroups-Return: sentto-279987-4825-1023971675-fc=all.net@returns.groups.yahoo.com Received: from [66.218.67.195] by n5.grp.scd.yahoo.com with NNFMP; 13 Jun 2002 12:34:36 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_3_2); 13 Jun 2002 12:34:35 -0000 Received: (qmail 23637 invoked from network); 13 Jun 2002 12:34:35 -0000 Received: from unknown (66.218.66.218) by m2.grp.scd.yahoo.com with QMQP; 13 Jun 2002 12:34:35 -0000 Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 13 Jun 2002 12:34:35 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5DCYis02841 for iwar@onelist.com; Thu, 13 Jun 2002 05:34:44 -0700 Message-Id: <200206131234.g5DCYis02841@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 13 Jun 2002 05:34:44 -0700 (PDT) Subject: [iwar] [fc:Do.you.sit.next.to.a.security.risk?] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20 X-Spam-Level: Do you sit next to a security risk? Vivienne Fisher, Yahoo.com, 6/12/02 <a href="http://pub109.ezboard.com/fgrassrootscurrentinformationcenterfrm1.showMessage?topicID=5714.topic">http://pub109.ezboard.com/fgrassrootscurrentinformationcenterfrm1.showMessage?topicID=5714.topic> Employees continue to be overlooked as an IT security threat, despite the significant destruction they can cause, according to one white paper. A white paper released in the United States by Web filtering vendor SurfControl found that more than 80 percent of security compromises faced by companies came from within. The white paper also found that poor security policies and procedures and lack of staff education contributed to employees being an IT security risk. "Whether incidents are due to malicious intent or inadvertent employee error, the result is the same: loss of revenue, productivity, and potential liability," said author Jack McCullough in a statement about the white paper. "Many organizations only develop or update policies and procedures in reaction to a security compromise," McCullough said. "As a result companies are vulnerable, despite spending large sums on security products and consultants." Charles Heunemann, managing director at SurfControl in Australia, estimates that about 90 percent of Australian companies' intellectual capital is held in digital format. Heunemann believes it's this which makes it a convenient target for unauthorized electronic transfer. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Will You Find True Love? Will You Meet the One? Free Love Reading by phone! http://us.click.yahoo.com/Deo18C/zDLEAA/Ey.GAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT