View Post

Managing Access to Information Resources

In Cybersecurity by Ian CarnaghanLeave a Comment

This entry is part 3 of 8 in the series Prevention and Protection Strategies

Security breaches caused by internal employees, consultants, business partners and any other individual or group of individuals that have privileged access to certain parts of the network remain one of the highest threats to digital assets.  In an article about the employee life cycle and identification of internal organizational threats, Conrad et al (2009) asserts that within an organization, the …

Share