{"id":2559,"date":"2017-09-19T09:28:45","date_gmt":"2017-09-19T15:28:45","guid":{"rendered":"http:\/\/www.the-internet-guy.com\/?p=2559"},"modified":"2017-09-19T09:28:45","modified_gmt":"2017-09-19T15:28:45","slug":"hackers-reveal-leading-enterprise-security-blind-spots-zdnet","status":"publish","type":"post","link":"https:\/\/www.the-internet-guy.com\/?p=2559","title":{"rendered":"Hackers reveal leading enterprise security blind spots | ZDNet"},"content":{"rendered":"<blockquote><p><a href=\"http:\/\/www.zdnet.com\/article\/hackers-reveal-leading-enterprise-security-blind-spots\/\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"http:\/\/www.the-internet-guy.com\/wp-content\/uploads\/2017\/09\/screen-shot-2017-09-19-at-02-01-07.jpg\" alt=\"\" \/><\/a><br \/>\nMobile devices and facial recognition software have made the list this year.<\/p><\/blockquote>\n<blockquote><p>Human error is often a factor when cybersecurity barriers fall, but according to hackers, password protection, facial recognition, and access controls are blind spots in corporate network security.<\/p>\n<p>According to Bitglass&#8217; Data Games:\u00a0<a href=\"http:\/\/bitglass.com\/data-games-report\">Security Blind Spots report<\/a>, both black and white self-labeled hackers said that these security measures are the least effective and it may not even be necessary to brute-force for credentials or snoop and steal them with Man-in-the-Middle (MiTM) attacks.<\/p>\n<p>Instead, human error and ignorance are always exploitable weak links and therefore phishing campaigns are the best data exfiltration strategy against the enterprise.<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/www.zdnet.com\/article\/hackers-reveal-leading-enterprise-security-blind-spots\/\">Hackers reveal leading enterprise security blind spots | ZDNet<\/a><\/em><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2559\" class=\"pvc_stats all  \" data-element-id=\"2559\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.the-internet-guy.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Mobile devices and facial recognition software have made the list this year. Human error is often a factor when cybersecurity barriers fall, but according to hackers, password protection, facial recognition, and access controls are blind spots in corporate network security. According to Bitglass&#8217; Data Games:\u00a0Security Blind Spots report, both black&hellip;<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/www.the-internet-guy.com\/?p=2559\">Read More<\/a><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2559\" class=\"pvc_stats all  \" data-element-id=\"2559\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.the-internet-guy.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-2559","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts\/2559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2559"}],"version-history":[{"count":1,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts\/2559\/revisions"}],"predecessor-version":[{"id":2561,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=\/wp\/v2\/posts\/2559\/revisions\/2561"}],"wp:attachment":[{"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-internet-guy.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}