Internal Security Threats

1296 Words 6 Pages
We’ve all heard the warnings, “Hackers are everywhere, arm yourselves with the right security to protect your information.”, and hopefully you are not one of the millions that have had their identity stolen. Imagine being in charge of a multibillion-dollar company, and it is your responsibility to make sure that every customers transaction that passes through the system is secure against attacks. That is a pretty big feat, but in today’s world it is a necessary evil that has become one of the biggest concerns faced by corporations. Accountability, in a security sense, is a set of goals that place emphasis on how a company will handle and protect themselves from a security breach. Many companies in the past, have learned hard lessons …show more content…
Policies should be constantly updated and gone over with employees to ensure they understand them. Ensuring that employees are not taking pertinent information to outside sources whether intentional or unintentionally is of other concern for the manager. Keeping security issues a very serious matter is important for the manager to reiterate to the employees, as are the repercussion that they may face if rules are broken. Some examples of real world internal threats are 1. Employees sharing login information 2. Watch, manage, and protect access to the internal network used by employees. Often times, many employees will share their login information with other co-workers who are having a difficult time logging into the system, or they simply have forgotten their own login information. As a manager, this is a practice that needs to be stopped immediately. This is how many employees with the wrong intentions can login under another employee ID and commit fraud or steal customer information. It is also important to remember that everyone has different access to certain areas within the system, meaning one employee may not have access to payroll, but the other does. This can open the flood gates for a serious internal attack. The second example of watching, managing, and protecting access is closely related to the protection …show more content…
What this means is that the company is taking every precaution to have the right people on the job when it comes to security as well as the most up-to-date security systems available. A breach may happen, but knowing that your company has done everything to protect against an attack should allow some peace of mind. Two ways that resource allocation translates into the workplace are: 1. Adding further encryption to already secure sites. 2. Supplementing with additional security teams to monitor around the clock vulnerabilities to the site. Adding additional encryption may seem like a strange thing to do if it is already existing on your site, but it is always better to be safe than sorry. Extra layers of firewalls will aid in the fight against hackers, and save the company money in the future having to defend themselves legally (Schiff, 2016). Having and extra set of eyes in regards to security is the way to go when monitoring the day to day operations of the business. About a week ago Amazon’s security team monitored what would be considered a threat to customer accounts, and sent those customers an email requesting them to reset their passwords. The problem was that these customers were using old passwords that they had used in the past, and hackers had gotten their hands on the list, putting the customer information at risk of a breach (Spadafora, 2016).

Related Documents