Access "Insider threat: Balancing security with privacy"
This article is part of the 30 July 2013 issue of The threat within – balancing security and employee privacy
Data loss prevention (DLP) systems, encryption, internet monitoring tools and other restrictive controls are failing to deliver total security, with a growing number of data breaches linked to insiders. But how can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? The challenge is an important one to tackle, with insider-related fraud up 43% in 2012, according to the latest report from the UK’s fraud prevention service Cifas, and 14% of all data breaches linked to insiders, according to The Verizon 2013 Data Breach Investigations Report. A more recent study by storage and information management firm Iron Mountain revealed that 8% of UK employees said that if they were treated badly by an employer, they would take revenge by stealing confidential or sensitive information. Why is the insider threat increasing? In recent years, companies with highly sensitive data have done a fairly good job of securing the network perimeter with firewalls and intrusion prevention systems, which has pushed attackers ... Access >>>
Premium Content for Free.
Anglian Water opens floodgates for external data
by Arif Mohamed
The water company has overhauled its data systems to efficiently manage and share information to benefit staff, customers, partners and regulators
- Anglian Water opens floodgates for external data by Arif Mohamed
Insider threat: Balancing security with privacy
by Warwick Ashford
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy?
- Insider threat: Balancing security with privacy by Warwick Ashford
More Premium Content Accessible For Free
In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...