How to eliminate insider threats

Image by Thinkstock
For years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner’s organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.
To read this article in full or to leave a comment, please click here
Read more: How to eliminate insider threats
Story added 30. January 2017, content source with full text you can find at link above.