The 7 scariest monsters in tech

Ghastlier than malware, these IT hellions can turn your tech department into a horror show -- quick

By , InfoWorld |  IT Management

This type of zombie isn't malicious, says Tim Matthews, senior director of product marketing for information and identity protection at Symantec. In fact, most of them think they're being helpful by trying to get work done at home or on the road.

"The biggest issue is the well-meaning insider who doesn't understand he's not supposed to email himself sensitive files or copy them to a flash drive," says Matthews. "Or he knows he shouldn't do it but perceives it as a very small risk -- like not wearing a seat belt when going to the store to buy milk. He thinks no one will know or that they won't lose that data, but in many cases it ends up being lost."

The other kind of zombie is one that falls for phishing emails or scareware scams, unwittingly installing malware that can steal data or bring down the network.

"Both of these types of insiders make the wrong choices and go about their days in a trancelike state, oblivious to the security risks they pose to the organization," he says.

Your best defense: While you could cut off their heads, the HR paperwork would be murder. A better fix is to fill their heads with information, so at least they know the rules and the risks, says Matthews.

But because not all zombies can be educated, smart organizations should also implement a data loss prevention solution that blocks sensitive information from being attached to an email message, copied to a thumb drive, or uploaded to a cloud storage service, he says. Or the system could allow the data to travel, but only after it's been encrypted.

"Typically, once people know the DLP is in place you see the number of incidents go down, as people start paying closer attention to their own behavior," he adds.

IT monster No. 3: Bandwidth VampiresHow to identify them: Sallow skin, bloodshot eyes from staring at screens, often seen holding iPhones.

They may be bringing their own devices to work or keeping their YouTube addiction to lunch hours, but these fiends are still feasting on your bandwidth, draining the lifeblood from your network.

The BYOD revolution in particular has caused a strain on network bandwidth, especially as more business-critical apps are delivered via the cloud, says Jim Melvin, CEO of AppNeta, a provider of cloud-based performance management and end-user experience monitoring services.

Originally published on InfoWorld |  Click here to read the original story.
Join us:






IT ManagementWhite Papers & Webcasts

Webcast On Demand

Data Breaches - Don't Be a Headline

Sponsor: Absolute Software Corporation

White Paper

PCI 3.0 Compliance

See more White Papers | Webcasts

Answers - Powered by ITworld

Ask a Question