Browse Definitions :
Definition

threat ignorance

Threat ignorance is a concept used by security professionals to determine the level of vulnerability a company or user’s computer or system has to an attack. The idea of threat ignorance stems from a lack of understanding about how to take basic security precautions on the part of a user. Additionally, some common types of cyberattacks prey on users with high levels of threat ignorance.

Attacks that can be prevented if a user understands viruses and malware include:

  • Credential theft: Often users with high threat ignorance use passwords that are too easy to guess or use the same password for every account. Once this password is identified, the entire system and any data that person has access to can be compromised.
  • Phishing and spear phishing attacks: This is an attempt to access an individual’s personal information by tricking them into allowing malware onto their device. Since these attacks are disguised, users that do not know how to identify them are at risk.
  • Email spoofing attacks: This is when emails are sent with fake email addresses made to look like it is from a known person. A more specific example of this is CEO fraud, when an attacker impersonates an important member of an organization to gain the trust of an unsuspecting user.
  • Denial-of-service attacks: Attackers prevent legitimate users from accessing resources with these attacks, making it hard for users with high threat ignorance to regain control over the system.
  • Automatic update attacks: This type of attack takes advantage of the automatic update functions to push spam to the device. Since most device or software updates are unsuspecting, this makes it easy to infect an unaware user.

Individuals can arm themselves against security threats by staying on top the latest attacks and practicing good security habits. Organizations have safer systems when each user considers themselves an active participant in maintaining the company's security. Most organizations have security protocols, but many do not frequently train employees in these protocols or strongly enforce them.

Best practices to minimize threat ignorance

While most users or organizations will possess some level of threat ignorance, the goal is to make it as minimal as possible. Ways to accomplish this include:

  • Train staff to be able to detect common security threats.
  • Educate employees to stay on top of updates and maintain proper anti-virus and anti-malware programs.
  • Dedicate a single employee or team to handle security for the organization.
  • Stay updated on risk analyses.
  • Enforce password rules, like complexity, confidentiality and routine changes.
  • Require that devices are password protected or use two-factor authentication (2FA).
  • Classify the levels of protection for different sets of resources and create appropriate security protocols for each level.
  • Follow up after security trainings to check employee comprehension.
This was last updated in May 2019

Continue Reading About threat ignorance

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close