Insider threat: Balancing security with privacy
Premium Content

Access "Insider threat: Balancing security with privacy"

Published: 30 Jul 2013

Data loss prevention (DLP) systems, encryption, internet monitoring tools and other restrictive controls are failing to deliver total security, with a growing number of data breaches linked to insiders. But how can organisations increase security without affecting productivity or encroaching on employees’ right to privacy? The challenge is an important one to tackle, with insider-related fraud up 43% in 2012, according to the latest report from the UK’s fraud prevention service Cifas, and 14% of all data breaches linked to insiders, according to The Verizon 2013 Data Breach Investigations Report. A more recent study by storage and information management firm Iron Mountain revealed that 8% of UK employees said that if they were treated badly by an employer, they would take revenge by stealing confidential or sensitive information. Why is the insider threat increasing? In recent years, companies with highly sensitive data have done a fairly good job of securing the network perimeter with firewalls and intrusion prevention systems, which has pushed attackers ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

What's Inside

Features

More Premium Content Accessible For Free

  • Government backs tech in 2015 Budget
    CWE_240315_ezine_20p-MED.jpg
    E-Zine

    In this week's Computer Weekly, chancellor George Osborne's 2015 Budget was the most technology friendly ever – we examine the key policy ...

  • Computer Weekly buyer's guide to software-defined everything
    CWE_BG_0115_Software-defined_everything-252.jpg
    E-Handbook

    In this 10-page buyer’s guide, Computer Weekly looks at the practicalities of the software-defined approach to everything including computing, ...

  • Cloud options investigated
    Cloud Options Investigated-252.jpg
    E-Handbook

    Arriva interim head of IT readiness Stuart Curley offers some tips on procuring cloud services in this PowerPoint presentation for Computer Weekly's ...