Explore places where things can go wrong in the modern world, including the interconnected nature of enterprise systems, malicious players, and careless employees.
- [Narrator] You may have found yourself asking at some point, why is this security stuff so darned hard anyways? We've been using computers a long time for cryin' out loud. Why hasn't somebody figured this all out already? Yeah, well, as a matter of fact, this is complicated stuff. There are a lot of things at play here. Take a look at the complex nature of many businesses networks. They may have hundreds or even thousands of servers located in various places, running multiple languages, to support different users and applications.
And these days we're not just talking about physical servers either. We have to include virtual servers, and processes being run directly via Cloud providers. Hackers are smart and getting smarter. They have great tools, which they share amongst themselves. And we seem to have entered a new age of hacking. Not only have leaks become more politicized, there are an increasing number of ransomware assaults, attacks where the hacker holds a business' information hostage and threatens to leak or destroy it unless their blackmail demands are met.
This will probably only get worse. But the saddest fact is that the largest number of security breaches are still caused internally by user action. Whether it's falling for a phishing scheme, or opening an infected file, or just doing something dumb. Employees are still the number one point of risk. And if that weren't bad enough, it keeps changing. The pace of change in technology is mind boggling.
And shows no signs of slowing down. So not only do we have to understand today's landscape, we have to keep current and even try to look ahead. If nothing else, we have very good reasons for being nice to our information security people. It's their jobs to stay on top of this.
- Identify the group of people to be notified when making a document policy or procedure change.
- Recognize which types of documentation requires higher levels of security.
- Name the two rights available at folder level during collaboration.
- Recall the purpose of version control.
- Determine which application allows multiple libraries with custom permissions.
- Identify the term used for add-ins within the SharePoint application.
- Explain the most common cause of data breaches.