Using shared computers and leaving temporary files could lead to a serious compromise

News by Dan Raywood

Temporary internet files could leave a business facing compromise as users share computers.

Temporary internet files could leave a business facing compromise as users share computers.

Randy Abrams, director of technical education at ESET, claimed that when he uses shared computers in hotels he often looks for what has been left in the temporary internet files to monitor the stored information.

Abrams said: “Users also leave things in the temporary files that can be used, such as their name, what company they work for, what their password is, shipping address and a link to the merchant, so this is a way to make building a profile easy.

“I have found details of a enterprise, a ship captain's vessel assignment and sales figures for a major medical company.”

Abrams explained that a temporary file downloads the script, web page, cookies and images, among other details. He encouraged users to go into the browser settings and delete the temporary files, and also to look in documents and settings, but advised that it is best not to look at sensitive information at all when using a shared computer.

He further claimed that this is an education issue, as people do not know how to delete temporary files. They do not know what they are and how they can be accessed and used.

“This applies to temporary files as well as temporary internet files,” said Abrams.

“This is probably a bigger threat to businesses than consumers, yes you can set a policy but it is not entirely viable to trust every user to do this.”


Find this article useful?

Get more great articles like this in your inbox every lunchtime

Upcoming event 

Webcast: Understanding this year's biggest adversaries - and how to combat them 

Nation-state activity, versatile, slippery strategies and Big Game Hunting - the threats are real, dangerous and ever changing. 
Brought to you in partnership with Crowdstrike