5 ways users circumvent security measures and how to prevent it
As a cybersecurity expert, Richard White supports locking down sensitive data to keep it out of the wrong hands. On the other hand, he says, companies go overboard with restrictions.
Those excessive restrictions can be self-defeating if they lock out workers, too, making it hard if not nearly impossible to do their jobs efficiently. So, they find workarounds. It’s a scenario that slows productivity and, ironically, puts the data itself in jeopardy.
Read more: 5 ways users circumvent security measures and how to prevent it
Story added 29. November 2017, content source with full text you can find at link above.