Security Starts With People: Three Steps to Build a Strong Insider Threat Protection Program

Advertisement


The threat putting you at risk actually looks something like this: Your bioscientist unlocks the front door with her employee badge and logs into the lab computers with her credentials. She’s just been denied a promotion — again — and has accepted an offer from a competitor. She’s downloading some of her research onto a flash drive to take with her once she leaves your employment.

This banal action may not be movie-worthy, but the consequences and scope of the potential losses definitely are.

Advertisement