Download now Free registration required
Over the past decade, most organizations have focused their IT security efforts on protecting and defending the network perimeter from the threat of anonymous hackers determined to compromise data and disrupt their systems - and for the most part, investments in this area have largely mitigated these threats. Today, the biggest threat to your information assets comes from users within the enterprise - including former users whose access rights have not yet been terminated. Although studies have found that 75% of all fraud and theft is perpetrated from within, most organizations have still done little to counter the risk of internal threats.
- Format: PDF
- Size: 4362.24 KB