News

Monday, October 13, 2008

Insider Threats - Who Can You Trust?

 
Windows IT Pro Resources
 
Featured Resource:
Addressing the Insider Threat with NetIQ Security and Administration Solutions
Download Now

Insider Threats — Who Can You Trust?

Organizations often think that once they hire an employee or a contractor, that person is now a part of a trusted group of people. Although an organization might allow an employee privileged access, why should they trust that person?

Most organizations deal with insider threats by defining application roles, restricting access to data, and identifying strict audit rules. Often forgotten are their computer administrators. IT administrators are granted eminent powers over servers, Active Directory, and applications as part of their jobs.

Mass media hysterics about external security threats has caused many of us to temporarily forget the most important rule-of-thumb about security - 80% of the threat to any organization comes from inside.

Read this paper to identify the key business processes in your organization that must be secured, and you will be highly equipped to build a solution that will contain an insider threat.



For more great technical information, check out Windows IT Pro Resources to see a full listing of available eBooks, white papers and essential guides.

Don't keep it all to yourself...Send this valuable info to a friend!


 


You are subscribed as boy.blogger@gmail.com.

You received this email because you have an existing business relationship with Windows IT Pro, a division of Penton Media. Periodically, we will inform you of special Penton-related shows, products and other offers that we believe you will find helpful in your business or career. To STOP receiving promotional e-mails from Windows IT Pro, please click here to opt-out.

Windows IT Pro| Penton Media | 249 W. 17th Street | New York, NY 10011 | Privacy Policy

 

No comments:

Blog Archive