2015 insider threat ebook
2015 insider threat ebook

Insiders come in various flavors, ranging from those with criminal intent to sell PII and credit card account numbers on the black market to absented-minded employees who lose a company-owned mobile device or forget to logout of their desktop at the end of the work day. As well, there are those employees who ordinarily would adhere to ethical principles, but find themselves susceptible to crossing the line for what they see as an easy payoff.

Regardless of the situation, the consensus of the experts we spoke with for this latest ebook from SC Magazine is that the continual deluge of high-profile cyber attacks during the past year reinforces the need for organizations to be cognizant of risks under their roofs. How can an organization thwart a privileged insider with an agenda? We discuss several tools, strategies and policies that today's organizations can put in place to manage privileged access and thwart abuse and incursions.

Click here to download this ebook on insider threats.