Scheduled Maintenance Notice: H2O will be undergoing maintenance on Weds, July 30. Some features may be temporarily unavailable during this period. Thank you for your understanding.

Main Content

Cybersecurity 101: Three-Part Introductory Section

1.3.5 User-based Vulnerabilities

Some vulnerabilities do not rely on specific technical hacks, but simply on the susceptibility of individual users.