Blog article
See all stories »

The Insider Threat

Interesting to watch the increasing trend in the security industry of thinking more about insider threats. Is this because companies are feeling more on top of the external hackers and viruses, or a growing awareness of the need to control outbound information flow as well as inbound?

 Certainly there have been more press articles on this topic of late, be it the news a while back that Lloyds TSB had got itself some pattern recognition software to spot employee fraud, or the article at ZDNet which very sensibly includes "forgetting that data traffic is two-way" as one of its four deadly security sins.

 Of course if an employee is really determined to get information out they can write it on a piece of paper and walk out the door, but it's important to do what you can to control outbound data flow. And accidental breaches of confidential information can be costly...

 Such news articles are quickly forgotten, although the more juicy ones where an accidental information leak involves public figure humiliation or multi million dollar loss can give pub / dinner party cred to the teller. Perhaps for this reason alone we are keeping a few of the most famous - and entertaining! - stories close to hand at all times as our personal reminder not to overlook the threat from the inside....

4069

Comments: (2)

A Finextra member
A Finextra member 15 August, 2007, 11:21Be the first to give this comment the thumbs up 0 likes It's getting so much easier to make off with sizeable amounts of data. If you have access to the necessary files, all you need is a USB memory device or even an iPod, MP3 player, phone or camera and you can make off with the lot!
A Finextra member
A Finextra member 15 August, 2007, 14:46Be the first to give this comment the thumbs up 0 likes And what about the comments/track changes metadata you forgot to scrub from that sensitive document that just left the building by way of an email attachment... Oh well, it was time to look for another job anyway....
Blog group founder

Member since

0

Location

0

More from member

This post is from a series of posts in the group:

Information Security

The risks from Cyber cime - Hacking - Loss of Data Privacy - Identity Theft and other topical threats - can be greatly reduced by implementation of robust IT Security controls ...


See all

Now hiring