(Bloomberg News) The U.S. Department of Homeland Security ran a test this year to see how hard it was for hackers to corrupt workers and gain access to computer systems. Not very, it turned out.

Staff secretly dropped computer discs and USB thumb drives in the parking lots of government buildings and private contractors. Of those who picked them up, 60 percent plugged the devices into office computers, curious to see what they contained. If the drive or CD case had an official logo, 90 percent were installed.

"There's no device known to mankind that will prevent people from being idiots," said Mark Rasch, director of network security and privacy consulting for Falls Church, Virginia-based Computer Sciences Corp.

The test showed something computer security experts have long known: Humans are the weak link in the fight to secure networks against sophisticated hackers. The intruders' ability to exploit people's vulnerabilities has tilted the odds in their favor and led to a spurt in cyber crimes.

In real-life intrusions, executives of EMC Corp.'s RSA Security, Intel Corp. and Google Inc. were targeted with e-mails with traps set in the links. And employees unknowingly post vital information on Facebook or Twitter.

It's part of a $1 trillion problem, based on the estimated cost of all forms of online theft, according to McAfee Inc., the Santa Clara, California-based computer security company.

Rule No. 1

Hundreds of incidents likely go unreported, said Rasch, who previously headed the Justice Department's computer crime unit. Corporate firewalls costing millions to erect often succeed in blocking viruses and other forms of malware that infect computers and steal data such as credit card information and passwords. Human error can quickly negate those defenses.

"Rule No. 1 is, don't open suspicious links," Rasch said. "Rule No. 2 is, see Rule No. 1. Rule No. 3 is, see Rules 1 and 2."

A full report on the Homeland Security study will be published this year, Sean McGurk, director of the department's National Cybersecurity and Communications Integration Center, said at a June 16 conference in Washington.

Tactics such as spear-phishing -- sending a limited number of rigged e-mails to a select group of recipients -- rely on human weaknesses like trust, laziness or even hubris.

First « 1 2 3 4 5 » Next