COLUMN: The 'people exploit'
When it comes to computer security, people are the gaping hole for hackers to exploit. Believe it or not, pretty sophisticated technologies exist to protect our data. The encryption algorithms available are well tested and require grossly impractical amounts of resources to breach. Virus detection and spam blocking are at all-time highs as well.