Take Steps to Mitigate the Threat of Insiders
Posted
by Troy Kitch
on Oracle Blogs
See other posts from Oracle Blogs
or by Troy Kitch
Published on Wed, 05 Jan 2011 22:25:56 -0800
Indexed on
2011/01/06
6:56 UTC
Read the original article
Hit count: 498
Database Vault
|insider threat
Register now for our upcoming Feb 23 Webcast The Insider Threat, Understand and Mitigate Your Risks. Insiders, by virtue of legitimate access to their organizations' information and IT infrastructure, pose a significant risk to employers. Employees, motivated by financial problems, greed, revenge, the desire to obtain a business advantage, or the wish to impress a new employer, have stolen confidential data, proprietary information, or intellectual property from their employers. Since this data typically resides in databases, organizations need to consider a database security defense in depth approach that takes into account preventive and detective controls to protect their data against abuse by insiders.
Register now and learn about:
- Actual cases of insider cyber crimes
- Three primary types of insider cyber crimes: IT sabotage, theft of intellectual property (e.g. trade secrets), and employee fraud
- Lack of controls around data that allow these crimes to be successful
- Solutions to help secure data and database infrastructure
© Oracle Blogs or respective owner