ITMPI FLAT 003
Main Menu
Home / CIO / 4 Symptoms and Solutions to Security Fatigue

4 Symptoms and Solutions to Security Fatigue

The news has led us to believe that security breaches are happening everywhere, and, well, that is probably true. But the notion that people should always be in a heightened state of alert has led to “security fatigue,” where overall organizational security declines. Could you be at risk of fatigue? In an article for Dark Reading, Tom Pendergast diagnoses some of the symptoms of security fatigue and how to go about fixing it.

Four Signs of Security Fatigue

  1. You reuse passwords.
  2. You forget to connect to VPN.
  3. You click on an email link – even though you’re not sure.
  4. You don’t report something that seems off.

We’ve all been guilty of having a go-to password for accounts that feel “minor.” But by using similar passwords across accounts, you leave your personal information incredibly vulnerable to hackers. While the individual sites may not offer much, using several of them together can yield a lot of information that a criminal could put to misuse. The best way around this problem is to use a password manager to be able to have consistently safe passwords. Going it alone might do the trick, but a password manager is the best bet.

Another sign of security fatigue can come from not connecting to VPN. If you connect to an unsafe website and wind up getting malware, it’s game over for your sensitive documents. They could be found and read very easily. The best bet here is to just get into the habit of connecting to VPN as soon as you log on at home; create an electronic reminder if you have to.

Pendergast next describes how to be safe with email links that could be malicious:

… you can resist phishing with a few simple tricks. First, turn your baloney detector on high and quickly delete anything that sounds too good to be true or comes out of left field. Second, recognize that you should never act on emails when you’re in a hurry (unless it’s to delete them). Third, if you get a lot of commercial email (I sure do), use rules to move it all to a folder, and then take a little time a few times each week to go through and identify the stuff you want to act on—deleting everything else.

If you see something that looks off, make sure you report the suspicious incident or observation, despite how inconvenient it may be. Or even if you just find that somebody has accidentally left out a sensitive folder, report its whereabouts. In either case, you’re looking out for those around you by taking that extra step to ensure everyone is safe and that information doesn’t fall into the wrong hands.

You can view the original article here: http://www.darkreading.com/endpoint/4-signs-you-your-users-tech-peers-and-c-suite-all-have-security-fatigue/a/d-id/1328103

About Austin J. Gruver

Austin is a Staff Writer for AITS. He has a background in professional writing from York College.

Check Also

How New Managers Can Send the Right Leadership Signals

It’s finally happened: You’ve made the jump from worker bee into a management position. Now …

Leave a Reply

Your email address will not be published. Required fields are marked *