Top 10 internal threats

Much of our security efforts, whether in small organizations or enterprises, is devoted to keeping unauthorized persons out of our networks. Unfortunately, the focus on that strategy overlooks the threats that can be posed by those who are already on the inside – both deliberately and inadvertently. Some of the most common avenues by which networks are infected or compromised include USB devices, laptops and notebooks, and optical media brought inside by employees or social engineers pretending to be someone who needs legitimate physical access.

Read about the top 10 internal vulnerabilities in this article over on ComputerWorld:

http://www.computerworld.com/s/article/9195458/Top_10_network_vulnerabilities_inside_the_network?taxonomyId=17&pageNumber=3

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top