Temporary files frequently left on shared computers

By

Better user education needed.

Temporary internet files could leave a business facing a serious compromise as users share computers, according to a training expert.

Randy Abrams, director of technical education at ESET, claimed that when he uses shared computers in hotels he often looks for what has been left in the temporary internet files to monitor the stored information.


Abrams said: “Users also leave things in the temporary files that can be used, such as their name, what company they work for, what their password is, shipping address and a link to the merchant, so this is a way to make building a profile easy.


“I have found details of a enterprise, a ship captain's vessel assignment, and sales figures for a major medical company.”


Abrams explained that a temporary file downloads the script, web page, cookies and images, among other details. He encouraged users to go into the browser settings and delete the temporary files, and also to look in documents and settings, but advised that it is best not to look at sensitive information at all when using a shared computer.


He further claimed that this is an education issue, as many people do not know how to delete temporary files. Indeed, most do not know what they are and how they can be accessed and used.


“This applies to temporary files as well as temporary internet files,” said Abrams.


“This is probably a bigger threat to businesses than consumers. Yes, you can set a policy but it is not entirely viable to trust every user to do this.”


See original article on scmagazineuk.com


Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

TPG Telecom reveals iiNet order management system breached

TPG Telecom reveals iiNet order management system breached

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Log In

  |  Forgot your password?