Unwitting Collaborators, Part 3: Spyware
Introduction
Educating your employees and staff can lessen the effects of intelligence-gathering tactics like identity impersonation or theft, or vulnerabilities in the human firewall. But a more insidious way to breach your networkand no one would be the wiseris through the use of spyware.
Spyware programs can create "backdoors" that bypass established security measures and compromise the integrity of your network. Any malicious program could give itself the same name as a trusted program to gain access to your network and secretly retrieve usernames, passwords, chat conversations, email, and more.
And it can be installed on your network by simply playing an online lottery game.