
The Weakest Link
Why Your Employees Might Be Your Biggest Cyber Risk
- 240 pages
- English
- PDF
- Available on iOS & Android
About this book
The Weakest Link looks at one of the biggest issues in cyber security: how to protect organisations from their own employees. Many cyber threats don't involve hackers using clever software to penetrate company networks; threats can often involve employees acting in ways that, accidentally or deliberately, leak information or damage assets without a hacker being involved at all. Emerging technologies and behavioural changes - driven by cloud computing and people using their own smartphones and tablets for work - are starting to make these threats more common and far more serious. Written to help anyone understand how information security has become the responsibility of individual employees, it shows exactly what they can do to protect company systems and data. Effective solutions need to go beyond simple security awareness and show how to create a complete culture of security. Individuals can then use this learned behaviour to keep themselves digitally safe at work and in their personal lives.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Contents
- Foreword
- Acknowledgements
- 1 Introduction to cyber security
- 2 Being human
- 3 Greedy – or careless?
- 4 Usable security
- 5 Knowledge of the risks
- 6 Alert to the risks
- 7 Trusting too much
- 8 Cyber security culture
- 9 Managing the managers
- 10 Managing the enterprise
- 11 Managing yourself
- Afterword: the near future
- Further reading
- Source references
- Index