Cyber Crime Trends: Our Seven Deadly Weaknesses

Successful cyber crime often depends on the kindness of others - those good souls who believe that the Facebook message , LinkedIn request or Tweet they received is from someone they actually know and therefore trust. As a CIO, it's imperative that you know your employees' weak spots, particularly when it comes to cyber crime perpetrated via social networking platforms. In its 2010 Annual Security Report, Cisco reveals the seven deadly human weaknesses that make your employees vulnerable to malicious attack. Chances are, your technology users are inherently good people, so their suspicions aren't likely to be aroused when cyber criminals strike through social media venues populated with friends and acquaintances. This is especially the case when messages involve someone asking for help. "Compassion and urgency are common social engineering hooks for criminals," says Christopher Burgess, senior security advisor to Cisco. "The individual seeking information will attempt to trigger the target's basic human need to be helpful. The individual will also infuse a sense of urgency in their quest for information or specific action, with the expectation that you won't have sufficient time to verify their credentials." Here we take a look at the seven human traits cyber criminals most frequently seek to exploit, and what you can do about them.

This article was originally published on 02-01-2011
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.