Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Information Security Survey highlights ex-employee threat

ScriptLogic : 11 November, 2009  (Technical Article)
A rise in backlash incidents from disgruntled employees features as a key growth in IT security threat in Information Security Survey
Ernst & Young's 2009 Global Information Security Survey indicated that backlash from recently departed employees combined with the lack of adequate security budgets and resources is becoming a major concern for senior IT professionals.

Nick Cavalancia, vice president of Windows Management at ScriptLogic, said: "This global survey revealed that a shocking 75% of respondents are concerned with possible reprisals from employees who have recently left their organisations. With mass redundancies having taken place earlier this year in a bid to streamline costs, the company must be prepared for a backlash from disgruntled employees who may chose to steal data on exit. With only 42% of respondents already trying to understand the potential risks related to this issue and only 26% taking steps to mitigate them, it has never been more obvious that businesses need to push this threat higher up their security agenda.

"Businesses must enforce a range of security measures to ensure internal or external data leakage do not take place. Organisations need to force security policies onto all computers and ensure strong access controls are in place, as well as lock down laptops and restrict use of removable storage, to limit the data users can access or store locally on their laptops. That means changing passwords after an employee has left the company and creating a fine grained approach to USB port control so that only limited users have access to extract data from the company system. With dwindling IT budgets, it is understandable that businesses are feeling the pinch and may find it hard to find money to invest in solutions to put all these controls in place; however the cost of failing to do so is much higher.

"Simple security measures can go a long way in protecting a business' IP, but IT has to put a plan in place to enforce those tactics, and the use of solutions which automate and centralise management of security is essential in order to achieve this in a timely and efficient fashion."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo