You have just finished building your new shiny server room in the hopes of achieving infrastructure nirvana with both improved security and availability. The ability to keep your infrastructure ‘up and running' makes you smile. All problems are gone, right? Think again, as it does not take too long for a regular user to attack your infrastructure. Effectively! These crypto-attackers quickly discover that the weakest link in any environment is end users as they have direct contact with data with minimal digging. Even innocent users are as dangerous as administrator's level of effort for the implementation of security! Come and see the possibilities and ideas that users can come up with and their results. Learn from someone else’s mistakes!
Available formats for this video:
Actual format may change based on video formats available and browser capability.
Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.