preview

Insider Threat : Security Review Analysis

Decent Essays

Insider Threat - Security Review Analysis

[INSERT A COVER PAGE FOR PROFESSIONALISM]

It is important for a company to set up regulations and protocols in order to help prevent the potential risk of an insider attack. It is unusual for one to fathom that an attack could happen from the inside instead of the outside, which is what usually puts most companies and groups off guard for the more commonly occurring attacks which come from within. That said, your company appears to have some holes and openings for potential threats that could occur from within. It would be advisable that you and your company begin to implement (A), (B), and (C) into your methods of running the company in order for you to ensure a safer environment from …show more content…

If either of these situations should arise, immediately look into the situation and make the appropriate changes. Be sure to follow up if it looks as if these changes were made with malintent.
When setting up user computers for employees, make sure that your technology department complies with the following restrictions:
Manage user permissions on employee computers to ensure users cannot install unwanted and potentially dangerous programs and plugins.
Make sure that all plugins and updates are installed on employee computers as they become available.
Keep computers standardized based on what department, and what type of programs they will need to perform their jobs (i.e. only install the programs necessary for the employee to do their job properly). The reasoning behind this is because if you give employees programs they don’t need this could compromise your company 's data/information. This happens when curious employees may try to login using other’s credentials in order to access information; the safest practice to avoid this is to make the program not available altogether on the employee 's computer.

(B) Outside of normal company standards and verifications we should also do the following to prevent the possibility of an accidental insider threat. These threats may occur not due to a person with malicious intent, but

Get Access