This facet of individual behavior holds good for all technology adoption and has nothing specific about cyber security in it. Having said that, considering the current developments , we are works in progress , I suppose. Once we establish the authenticity (and fix accountability) of originating source we are close to eliminating this issue I suppose.
You are viewing a single comment's thread from: