Access "Preventing Data Theft, Combating Internal Threats"
This article is part of the January 2006 issue of How to stop data leakage
Your worst enemy could very well be inside your network. We'll show you how to prevent insiders from sharing your most critical data. Your problem might not be a hacker trying to break into your network: It could be Jim in engineering, or Steve in sales--maybe even Cindy in production. Your employees could be snatching intellectual property and e-mailing it to competitors, or they could be inadvertently sending out confidential customer information. Employees who deliberately or unwittingly leak confidential information outside corporate confines pose a huge threat--one that businesses might overlook. This kind of data seepage can cost an organization millions of dollars and cause irreparable damage to its reputation. According to a 2005 U.S. Secret Service and Carnegie Mellon's Software Engineering Institute study of insider breaches in critical infrastructure sectors, 81 percent of such breaches resulted in financial losses ranging from a $500 to "tens of millions of dollars." Additionally, 28 percent of the respondent organizations said their reputation ... Access >>>
Premium Content for Free.
Recent Releases: Security product briefs, January 2006
Learn about the security products that launched in January 2006.
Authentication: TriCipher Armored Credential System v3.1.1
by Steven Weil, Contributor
TriCipher's TACS v3.1.1
Preventing Data Theft, Combating Internal Threats
Defend against internal threats and prevent information leakage and hacker attacks with several tactics such as employee monitoring, behavioral analysis tools, encryption and incident response.
Your routers and switches can yield a mother lode of security information about your network--if you know where to dig
by Dr. Juergen Schneider
This tip covers ways that you can secure a network to protect data from internal as well as external attacks.
- Recent Releases: Security product briefs, January 2006
Peak of Security
IE 7.0, Firefox, Netscape: One of these browsers comes out on top—we'll tell you which one.
Secure Reads: Security and Usability
Read a review of the book Security and Usability.
Hot Pick: M-Tech Information Technology's ID-Synch 4.0
M-Tech Information Technology's ID-Synch v4.0
Help From Above
Security managers are looking to the keepers of the Internet cloud for relief.
- Peak of Security
Perspectives: Midmarket organizations short on security budgets and respect
Industry solutions are tailored for big companies and big budgets--leaving SMBs in the dust.
Ping: Marcus Sachs
Editor's Desk: The state of patching
Party Like It's 1999?
Layer 8: Time to call a security specialist?
- Perspectives: Midmarket organizations short on security budgets and respect
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.