-
作者Nigel Stanley@Bloor Research
-
简介
- Introduction
- What is the Inside Threat?
- Inside Threat vs. Insider Threat
- Inside Threat: is there a problem?
- Anatomy of an inside data loss incident
- Who: who lost the data from the organisation?
- What: what actually went missing?
- Why: why did the data go missing?
- When: when did the data go missing?
- How: how did the data go missing?
- Now it’s personal: Inside Threat, Risk and Governance
- Mitigating the Threat: what tools can help
- Summary
The inside threat is very real. Even the most motivated, committed and enthusiastic staff can and will make mistakes that may result in significant data.
- Key action points for businesses;
- Undertake an honest, objective review of your likely inside threat.
- Manage staff wisely by equipping them to do their roles effectively, but do not grant access rights or privileges where it is not needed.
- Implement the best solutions to manage your particular inside threats as you see them. Wise spending now will save more panic based spending in the future.
- Train staff to be competent users of technology.
- Ensure executive support for IT security and articulate the business benefits of maintain vigilance against the inside threat.loss.
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-03-24 14:54:42
-
2016-03-24 14:24:09
-
2016-03-17 03:12:02
附件下载
-
Insider.Threat介绍.pdf