[iwar] [fc:Do.you.sit.next.to.a.security.risk?]

From: Fred Cohen (fc@all.net)
Date: 2002-06-13 05:34:44


Return-Path: <sentto-279987-4825-1023971675-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 13 Jun 2002 05:36:08 -0700 (PDT)
Received: (qmail 4896 invoked by uid 510); 13 Jun 2002 12:34:48 -0000
Received: from n5.grp.scd.yahoo.com (66.218.66.89) by all.net with SMTP; 13 Jun 2002 12:34:48 -0000
X-eGroups-Return: sentto-279987-4825-1023971675-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.195] by n5.grp.scd.yahoo.com with NNFMP; 13 Jun 2002 12:34:36 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_3_2); 13 Jun 2002 12:34:35 -0000
Received: (qmail 23637 invoked from network); 13 Jun 2002 12:34:35 -0000
Received: from unknown (66.218.66.218) by m2.grp.scd.yahoo.com with QMQP; 13 Jun 2002 12:34:35 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 13 Jun 2002 12:34:35 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g5DCYis02841 for iwar@onelist.com; Thu, 13 Jun 2002 05:34:44 -0700
Message-Id: <200206131234.g5DCYis02841@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Thu, 13 Jun 2002 05:34:44 -0700 (PDT)
Subject: [iwar] [fc:Do.you.sit.next.to.a.security.risk?]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

Do you sit next to a security risk?

Vivienne Fisher, Yahoo.com, 6/12/02
<a href="http://pub109.ezboard.com/fgrassrootscurrentinformationcenterfrm1.showMessage?topicID=5714.topic">http://pub109.ezboard.com/fgrassrootscurrentinformationcenterfrm1.showMessage?topicID=5714.topic>

Employees continue to be overlooked as an IT security threat, despite
the significant destruction they can cause, according to one white
paper.

A white paper released in the United States by Web filtering vendor
SurfControl found that more than 80 percent of security compromises
faced by companies came from within.

The white paper also found that poor security policies and procedures
and lack of staff education contributed to employees being an IT
security risk.

"Whether incidents are due to malicious intent or inadvertent employee
error, the result is the same: loss of revenue, productivity, and
potential liability," said author Jack McCullough in a statement about
the white paper.

"Many organizations only develop or update policies and procedures in
reaction to a security compromise," McCullough said. "As a result
companies are vulnerable, despite spending large sums on security
products and consultants."

Charles Heunemann, managing director at SurfControl in Australia,
estimates that about 90 percent of Australian companies' intellectual
capital is held in digital format. Heunemann believes it's this which
makes it a convenient target for unauthorized electronic transfer.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Will You Find True Love?
Will You Meet the One?
Free Love Reading by phone!
http://us.click.yahoo.com/Deo18C/zDLEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2003-08-24 02:46:32 PDT