<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The Insidious Insider Threat!</title>
	<atom:link href="http://www.gfi.com/blog/insidious-insider-threat/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/insidious-insider-threat/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=insidious-insider-threat</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/insidious-insider-threat/comment-page-1/#comment-29370</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 14 Jul 2011 10:56:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3346#comment-29370</guid>
		<description><![CDATA[I have to agree with Carter, hoping to keep employees in line by controlling every aspect of their daily activities is likely to make you more insecure than secure because either:

A. People will leave the job forcing the organization to hire frequently and having to lax its standards to quickly fill in the vacant places 

B. Angry employees will get an opportunity to pay the company back!

As with everything else, there should be a balance when dealing with security. ]]></description>
		<content:encoded><![CDATA[<p>I have to agree with Carter, hoping to keep employees in line by controlling every aspect of their daily activities is likely to make you more insecure than secure because either:</p>
<p>A. People will leave the job forcing the organization to hire frequently and having to lax its standards to quickly fill in the vacant places </p>
<p>B. Angry employees will get an opportunity to pay the company back!</p>
<p>As with everything else, there should be a balance when dealing with security. </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Carter Rubens</title>
		<link>http://www.gfi.com/blog/insidious-insider-threat/comment-page-1/#comment-29361</link>
		<dc:creator>Carter Rubens</dc:creator>
		<pubDate>Mon, 11 Jul 2011 17:56:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3346#comment-29361</guid>
		<description><![CDATA[@Uninymous - the brute force attack you are suggesting won&#039;t work, unless the employee is real stupid. If the employee is smart enough, he can take the adequate measures. For instance, if you fire an admin, I can bet my life that a smart one will leave numerous backdoors that allow him access. 
Trust isn&#039;t useless - it just depends whom you trust. Well, even the best psychologist might be fooled but when you hire crap and hope to control it with brute force, expect lots of damage.]]></description>
		<content:encoded><![CDATA[<p>@Uninymous &#8211; the brute force attack you are suggesting won&#8217;t work, unless the employee is real stupid. If the employee is smart enough, he can take the adequate measures. For instance, if you fire an admin, I can bet my life that a smart one will leave numerous backdoors that allow him access.<br />
Trust isn&#8217;t useless &#8211; it just depends whom you trust. Well, even the best psychologist might be fooled but when you hire crap and hope to control it with brute force, expect lots of damage.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/insidious-insider-threat/comment-page-1/#comment-29315</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 05 Jul 2011 09:42:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3346#comment-29315</guid>
		<description><![CDATA[I follow what you&#039;re saying Uninmymous and yes, at some stages you can be proactive. It should be standard practice to limit employees&#039; internet access when they are fired, access to systems should be revoked immediately and HR should be clear with employees when hiring.

But in other instances you have nothing more than trust to go on really. You cannot fully prevent an employee from missusing what he/she learns while at work. Furthermore, how can you be 100% successful in preventing an employee form learning what he/she shouldn&#039;t during work hours? This can happen in various ways; in this post the employee simply looked at the titles on the CMS system. 

Employees might learn information by overhearing a conversation in the cafeteria, catching a glimpse of a printed report on a coworker&#039;s desk, having a conversation with a coworker who isn&#039;t careful with what he/she says, there are even stories of people talking about what I would consider confidential information on social sites! And all this has to do with accidental disclosure; imagine how much worse the situation is when someone gets a job with your organization specifically because s/he believes they can use that job to get insider information!

There are steps you can take to limit the risk, of course, but at some point you just have to trust your employees. The only other option is to assign a person to watch their every move and another person to watch the watcher - an option which is quite impractical and which would probably still not guarantee 100% safety! 

This brings us back to what Anthony was saying, if you focus too much on actual control employees will be unhappy and that makes it more likely that they act against the company&#039;s best interest as opposed to happy employees. It&#039;s a case where too much security actually makes you less secure.]]></description>
		<content:encoded><![CDATA[<p>I follow what you&#8217;re saying Uninmymous and yes, at some stages you can be proactive. It should be standard practice to limit employees&#8217; internet access when they are fired, access to systems should be revoked immediately and HR should be clear with employees when hiring.</p>
<p>But in other instances you have nothing more than trust to go on really. You cannot fully prevent an employee from missusing what he/she learns while at work. Furthermore, how can you be 100% successful in preventing an employee form learning what he/she shouldn&#8217;t during work hours? This can happen in various ways; in this post the employee simply looked at the titles on the CMS system. </p>
<p>Employees might learn information by overhearing a conversation in the cafeteria, catching a glimpse of a printed report on a coworker&#8217;s desk, having a conversation with a coworker who isn&#8217;t careful with what he/she says, there are even stories of people talking about what I would consider confidential information on social sites! And all this has to do with accidental disclosure; imagine how much worse the situation is when someone gets a job with your organization specifically because s/he believes they can use that job to get insider information!</p>
<p>There are steps you can take to limit the risk, of course, but at some point you just have to trust your employees. The only other option is to assign a person to watch their every move and another person to watch the watcher &#8211; an option which is quite impractical and which would probably still not guarantee 100% safety! </p>
<p>This brings us back to what Anthony was saying, if you focus too much on actual control employees will be unhappy and that makes it more likely that they act against the company&#8217;s best interest as opposed to happy employees. It&#8217;s a case where too much security actually makes you less secure.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Uninymous</title>
		<link>http://www.gfi.com/blog/insidious-insider-threat/comment-page-1/#comment-29312</link>
		<dc:creator>Uninymous</dc:creator>
		<pubDate>Tue, 05 Jul 2011 07:08:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3346#comment-29312</guid>
		<description><![CDATA[For me trust is useless for this kind of situation. When it comes to insider threats, both the HR and IT departments should be vigorous and proactive enough to their strategies. 

For instance, when an employee is about to leave or resign from the company, the said departments should limit the worker&#039;s access to business documents (both online and offline). At the employee&#039;s last days, the company should not give him or her integral assignments. The HR should make sure the employee is cleared.]]></description>
		<content:encoded><![CDATA[<p>For me trust is useless for this kind of situation. When it comes to insider threats, both the HR and IT departments should be vigorous and proactive enough to their strategies. </p>
<p>For instance, when an employee is about to leave or resign from the company, the said departments should limit the worker&#8217;s access to business documents (both online and offline). At the employee&#8217;s last days, the company should not give him or her integral assignments. The HR should make sure the employee is cleared.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/insidious-insider-threat/comment-page-1/#comment-29305</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 01 Jul 2011 08:32:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3346#comment-29305</guid>
		<description><![CDATA[You&#039;re right Anthony in that it is impossible to completely eliminate the problem. All you can do is try to mitigate it and reduce the risk as much as possible and have controls in place to detect breaches as early as possible.]]></description>
		<content:encoded><![CDATA[<p>You&#8217;re right Anthony in that it is impossible to completely eliminate the problem. All you can do is try to mitigate it and reduce the risk as much as possible and have controls in place to detect breaches as early as possible.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Anthony Lanzano</title>
		<link>http://www.gfi.com/blog/insidious-insider-threat/comment-page-1/#comment-29304</link>
		<dc:creator>Anthony Lanzano</dc:creator>
		<pubDate>Fri, 01 Jul 2011 00:41:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3346#comment-29304</guid>
		<description><![CDATA[It is certainly true that happy employees will probably not engage in such outside activities, mostly out of fear for losing their job. Of course, if you hire in somebody who on the outset is trying to run such an operation, there isn&#039;t much you can do. Definitely a tricky situation but keeping your security tight and open dialogue between IT, management, and employees, things like this can hopefully be spotted early.]]></description>
		<content:encoded><![CDATA[<p>It is certainly true that happy employees will probably not engage in such outside activities, mostly out of fear for losing their job. Of course, if you hire in somebody who on the outset is trying to run such an operation, there isn&#8217;t much you can do. Definitely a tricky situation but keeping your security tight and open dialogue between IT, management, and employees, things like this can hopefully be spotted early.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:05:15 by W3 Total Cache --