zlacker

[parent] [thread] 3 comments
1. 0xedd+(OP)[view] [source] 2022-01-28 00:50:12
Wrong. 80% of attacks are social engineering ones. In which an employee is convinced to make a bank transfer, open some document, install some program. From there, often times it's exploiting wide spread software commonly found in large organizations.

Everything you said cannot be further from the truth.

replies(1): >>themac+J1
2. themac+J1[view] [source] 2022-01-28 01:01:14
>>0xedd+(OP)
Hence the pre-approved software restrictions. In a locked down system, even the most gullible employee won't have the authorization to "install some program".

I'd also hope that businesses care about more than 80% of attacks, preferably they should care about 100% of attacks. Hence, pre-approved software restrictions.

replies(1): >>ensan+ve
◧◩
3. ensan+ve[view] [source] [discussion] 2022-01-28 02:56:11
>>themac+J1
Wrong again.

The computers in any sizable business already have the pre-approved restrictions set on the OS level. Employers can’t just install any software.

replies(1): >>xxpor+Do
◧◩◪
4. xxpor+Do[view] [source] [discussion] 2022-01-28 04:58:07
>>ensan+ve
That's not true at any big dev shop
[go to top]