Human error has been the source of most breaches since I can remember. What can be done about it?
FTA
The threat intelligence player drew on multiple data sources, including dark web analysis, pen-testing data, incident response cases and threat intelligence to compile the https://www.ibm.com/downloads/cas/WMDZOWK6 (2021 IBM Security X-Force Cloud Threat Landscape Report.)
It revealed that attackers are actively looking to exploit weaknesses in enterprise protection, many of which come about due to human error.
To this end, over half of breaches came about as a result of shadow IT, when systems were spun up without being subject to corporate security policy — and therefore lacked vulnerability and risk assessments and hardened security protocols.
Additionally, two-thirds of the incidents studied involved improperly configured APIs.
----
https://www.infosecurity-magazine.com/news/misconfigured-apis-cloud-breaches/ (https://www.infosecurity-magazine.com/news/misconfigured-apis-cloud-breaches/)
#healthcare #cio #cmio #healthIT #chime #himss

Human error has been the source of most breaches since I can remember. What can be done about it?

FTA

The threat intelligence player drew on multiple data sources, including dark web analysis, pen-testing data, incident response cases and threat intelligence to compile the 2021 IBM Security X-Force Cloud Threat Landscape Report.

It revealed that attackers are actively looking to exploit weaknesses in enterprise protection, many of which come about due to human error.

To this end, over half of breaches came about as a result of shadow IT, when systems were spun up without being subject to corporate security policy — and therefore lacked vulnerability and risk assessments and hardened security protocols.

Additionally, two-thirds of the incidents studied involved improperly configured APIs.

----

https://www.infosecurity-magazine.com/news/misconfigured-apis-cloud-breaches/

#healthcare #cio #cmio #healthIT #chime #himss