{"id":386,"date":"2015-04-04T17:41:10","date_gmt":"2015-04-04T17:41:10","guid":{"rendered":"http:\/\/54.201.249.27\/?p=386"},"modified":"2015-04-04T17:41:10","modified_gmt":"2015-04-04T17:41:10","slug":"az-central-most-security-breaches-involve-human-error","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/az-central-most-security-breaches-involve-human-error\/","title":{"rendered":"AZ Central: Most security breaches involve human error"},"content":{"rendered":"

This week’s news that 31 world leaders, including President Obama \u2013 who had their personal information breached, including name, date of birth and passport number \u2013 should remind employers and employees that human error is a significant factor in data breach events.<\/p>\n

In this case, an Australia immigration service employee mistakenly e-mailed the sensitive information of the above-mentioned world leaders days before November’s G-20 summit in Brisbane, Australia.<\/p>\n

However, the Australian immigration department did not report the breach to the world leaders even though it was a clear violation of the privacy laws of three of the affected countries, including the U.K., France and Germany, all of which require mandatory notification for data breach victims.<\/p>\n

Well it gets worse. In IBM’s 2014 Cyber Security Intelligence Index, “95 percent of all security incidents involve human error.”…<\/p>\n

Read the full article here:\u00a0http:\/\/www.azcentral.com\/story\/money\/business\/tech\/2015\/04\/03\/security-breaches-involve-human-error\/70872872\/<\/a><\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

In IBM’s 2014 Cyber Security Intelligence Index, “95 percent of all security incidents involve human error.” According to the IBM’s report, “many of these are successful security attacks from external attackers who prey on human weakness in order to lure insiders within organizations to unwittingly provide them with access to sensitive information.”<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/386"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}