3 low-tech threats that lead to high-profile breaches

In an age where data security defenses are getting more and more sophisticated, there will be increased pressure for malicious parties to glean information from within the organization’s walls or public places.

Moving forward, we can expect to see a shift from hacking networks to a focus on hacking people. The tactics used to hack people are not highly sophisticated and can encompass relatively stealth threat vectors, making them hard to trace. It seems simple, but it’s important not to overlook the low-tech threats in our high-tech world.

[ A look back at 2014’s data protection nightmare ]

To read this article in full or to leave a comment, please click here

Read more: 3 low-tech threats that lead to high-profile breaches

Story added 16. December 2014, content source with full text you can find at link above.