Note that the technical threats begin at position number 7! But the top 6 are dominated by the threats based on the user behaviour (and the lack of proper tools/policies that allow such behaviour)!
Why does that happen? What can be done? Read on to learn more and see some Dilbert!(more…)