ipl-logo

Analysis Of Vulnerabilities That Arise From An Insider

921 Words4 Pages

The article sheds light on vulnerabilities that arise from an insider. Insiders could be an employee, a vendor, a contractor, etc. Threats to a company’s network could arise from external sources, such as hackers gaining unlawful access to the network by exploiting vulnerabilities of the software and hardware of the network infrastructure. However, hackers could also use the aid of an employee to access the network. Insiders can help hackers access their network willingly, under force, blackmailed, or even unknowingly. Nowadays, 20% of cyberattacks are made possible due to the threat of insiders aiding hackers. The threat is increasing because many companies lack the proper methodologies to protect their employees from being targeted and exploited …show more content…

In order to reduce the chance of being exploited by a disgruntled employee, it is important to raise awareness for employees to be on the lookout for any suspicious behavior such as breech of protocol and provide the means for reporting. Another important thing to consider is provide a rigorous hiring procedure to ensure the stability of the employee and for subcontractors. The article provided me with an insight on the threats that can result from insiders. It equates to having a strong, unbreakable fort only to be penetrated by an unfaithful guard or by a Trojan.“The most effective strategy for defusing the cyber-threat posed by insiders is to use the protective technologies available and fix weak points in them, but focus ultimately on getting all insiders to behave in a way that keeps the company safe. People need to know what behaviors are acceptable or unacceptable. Remind them that protecting the organization also protects their jobs.”Equating the company’s security to job security may make employees more diligent and aware of their cyber

Open Document