CIOIT Governance

4 Symptoms and Solutions to Security Fatigue

The news has led us to believe that security breaches are happening everywhere, and, well, that is probably true. But the notion that people should always be in a heightened state of alert has led to “security fatigue,” where overall organizational security declines. Could you be at risk of fatigue? In an article for Dark Reading, Tom Pendergast diagnoses some of the symptoms of security fatigue and how to go about fixing it.

Four Signs of Security Fatigue

  1. You reuse passwords.
  2. You forget to connect to VPN.
  3. You click on an email link – even though you’re not sure.
  4. You don’t report something that seems off.

We’ve all been guilty of having a go-to password for accounts that feel “minor.” But by using similar passwords across accounts, you leave your personal information incredibly vulnerable to hackers. While the individual sites may not offer much, using several of them together can yield a lot of information that a criminal could put to misuse. The best way around this problem is to use a password manager to be able to have consistently safe passwords. Going it alone might do the trick, but a password manager is the best bet.

Another sign of security fatigue can come from not connecting to VPN. If you connect to an unsafe website and wind up getting malware, it’s game over for your sensitive documents. They could be found and read very easily. The best bet here is to just get into the habit of connecting to VPN as soon as you log on at home; create an electronic reminder if you have to.

Pendergast next describes how to be safe with email links that could be malicious:

… you can resist phishing with a few simple tricks. First, turn your baloney detector on high and quickly delete anything that sounds too good to be true or comes out of left field. Second, recognize that you should never act on emails when you’re in a hurry (unless it’s to delete them). Third, if you get a lot of commercial email (I sure do), use rules to move it all to a folder, and then take a little time a few times each week to go through and identify the stuff you want to act on—deleting everything else.

If you see something that looks off, make sure you report the suspicious incident or observation, despite how inconvenient it may be. Or even if you just find that somebody has accidentally left out a sensitive folder, report its whereabouts. In either case, you’re looking out for those around you by taking that extra step to ensure everyone is safe and that information doesn’t fall into the wrong hands.

You can view the original article here:

Related Articles

Back to top button

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.