Whodunit? Stop these employees from leaking your corporate data
Was it the receptionist, the salesman or the building manager who gave away company secrets? Here's how to find and stop the leaks.
Computerworld - You might know how to secure your network devices and data centers to keep your corporate intelligence safe. But do you know how to teach your employees how to guard against attacks -- not generically, but based on the work they do? Experts suggest that a well-constructed security plan involves customized training by job function. You need to tell your HR people to manage personnel files that might reside in multiple locations, your facilities crew to watch out for people entering the building with fake IDs and your salespeople to guard access to the company's CRM system.
Read about the key security threats in each of six job functions, and learn tips from security experts like Ira Winkler for spotting the most common ploys of con artists who make it their job to extract sensitive corporate intelligence from unsuspecting employees. And finally, ask yourself: How far will you go to defend the privacy of your customers' and employees' personal data? Columnist Mark Hall looks at the stellar example librarians have set in protecting their patrons' privacy.
Trusting an employee with access to mission-critical or sensitive systems is a risky but unavoidable gamble. Let's face it: People are wild cards. In fact, let's take the gambling analogy a step further. Just as casinos thwart cheaters at every table or station on their floors, so, too, can IT officials thwart breaches by customizing security plans for individual employees in every zone of their companies.
In fact, casino practices can be translated to the corporate IT world to create at a common-sense list of do's and don'ts for redoubling security based on who does what job. The lessons we learn from craps pits and blackjack tables reveal that it's never wise to entrust your business's most valuable or vulnerable assets to a single employee. Instead, compartmentalize access whenever possible, and never hesitate to look over employees' shoulders.
Above all, follow the golden rule of a casino: Gauge your level of risk and develop airtight audit trails, urges Bruce Schneier, a security expert in Mountain View, Calif., who has written several books on computer and network security, including Applied Cryptography (Wiley, 1996). Schneier often uses the casino metaphor to drive home important points surrounding individualized security. "If you look at a casino floor, you will notice immediately that people are watching people," he says. "That's because a lot of cash is moving, and it's moving very quickly."
Just as edgy casino managers constantly size up everyone on the floor as potential security threats, so must corporate IT security leaders size up every employee. "People are the weakest link in security. They always have been, and you will never change that," Schneier says. "But the reality is that you've got to deal with people, and people are going to make mistakes."
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!