General discussion
Thread display: Collapse - |
All Comments
Start or search
Create a new discussion
If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.
Better definition of insider
From what I have observed most organizations invest in firewalls that will secure public facing services. These same organizations will attempt to set and keep a patch SLA. Where most organizations appear to fail to mitigate their exposure to risk is with remote and internal users. These users are more likely to download or bring in a threat that can then be used to compromise a system and/or network.
Threats may be developed externally but the majority of exploits appear to originate from an ignorant insider. If security specialists defined the origination of the breach, internal or external, than I would suspect that 80% of breaches start inside verus 20% outside.