Insider Threats — Who Can You Trust? Organizations often think that once they hire an employee or a contractor, that person is now a part of a trusted group of people. Although an organization might allow an employee privileged access, why should they trust that person? Most organizations deal with insider threats by defining application roles, restricting access to data, and identifying strict audit rules. Often forgotten are their computer administrators. IT administrators are granted eminent powers over servers, Active Directory, and applications as part of their jobs. Mass media hysterics about external security threats has caused many of us to temporarily forget the most important rule-of-thumb about security - 80% of the threat to any organization comes from inside. For more great technical information, check out Windows IT Pro Resources to see a full listing of available eBooks, white papers and essential guides.
|
You received this email because you have an existing business relationship with Windows IT Pro, a division of Penton Media. Periodically, we will inform you of special Penton-related shows, products and other offers that we believe you will find helpful in your business or career. To STOP receiving promotional e-mails from Windows IT Pro, please click here to opt-out.
|
No comments:
Post a Comment