Published at LXer:
Corporations spend billions building effective security protocols, but complacency and a desire for efficiency can soon lead to deviations from security protocols that workers gradually become accustomed to. The result is that small but potentially crippling holes develop in even the most effective systems, creating openings for attackers, including, potentially, insiders. Countering the insider threat requires a comprehensive, multi-tiered approach that includes physical controls, software access controls, and software protection/obfuscation.
Read More...