Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the chance of ‘the bad Apple employee’. As a result, proactive threat assessments are crucial for preventing employee-related breaches and reducing their impact when they happen. The only true solution is to develop a custom template for your own needs, but this one should be used as a starting point for areas to consider when determining the risks of your employees compromising security, as well as what’s at stake. Your ultimate goal should be a comprehensive privacy program… But that doesn’t necessarily translate into more security spend. In fact, many of the companies that have been on the receiving end of the most high-profile breaches were the ones pouring the most cash into security. In almost all cases, security efficacy comes down to thoroughness and how well you follow some simple rules. In fact, data protection can be broken down into a few manageable steps:
1. Identify threats. Breaches can be a result of employee carelessness or intentional outside attacks.
- Dan Virgillito
- Industry News
- Posted On