Introduction:. A “Scientist Not Only Identified People

1415 WordsMar 17, 20176 Pages
Introduction: A “scientist not only identified people as the most widespread, diverse and dangerous source of destabilizing impacts on protected information, but also revealed different categories of people that may have this impact, and developed a detailed classification of the threat on different grounds” (Astakhova, 2015). Employees are what can a make business a front-runner in the industry. They are also the one that with a click of the mouse can halt all production. Employees can be the best asset to your company. Staff responsible for the data need to be trained on basic security procedures to recognize deceptive techniques used by fraudsters and identity thieves, such as social engineering, and must report these techniques to…show more content…
According to table 1. Summary of Findings from Annual Reports page 799 during that timeline, Widup reported that there were 721.9 million records breached (Collins, 2011). According to table 1. Summary of Findings from Annual Reports page 799, of the 721.9 million records leaked 507.2 million records were business related records (Collins, 2011). According to Nick Bradley, IBM’s Cyber Threat Research manager “55 percent of all attacks are carried out by malicious insiders or inadvertent actors, also known as insider threats (Bradley, 2015). Collins is able to state that 507.2 million business records were leaked (Collins, 2011). Bradley’s research states that over half of all records leaked are due to insiders or personnel. Bradley’s and Collins’s research is able to state that of the 721.9 million records leaked, 279 million records or 55 percent of the records were exposed due to the actions of insiders. That is a very scary statistic to think about. The people that you work with every day. The people that you trust to help run your company are highly likely to be the perpetrators to a breach in your security. Bradley then included further information in “Who are the bad guys?” that identifies malicious insiders as the majority offender at 31.5%, and inadvertent actors at 23.5%” (Bradley,2015). Theses statics show that we should be cautious of any insider. While
Open Document