Skip to main content

Internal Threat

In today's world, it is the internal employee and other internal threats that are the biggest security concerns for any organization. There are a lot of measures to ensure that one is well protected from the external threat but most companies do not concentrate that much on the internal threats.

Follow the best practices for to mitigate internal risks. A few of my suggestions:
 

  • Have a well defined Internal Risk Assessment Program and Group.
     
  • Ensure that you empower this group with the powers to take corrective measures against errant employees and also that the top management toes the line too.
     
  • Conduct periodic internal risk audits. It would be better if these audits are sudden in nature.
     
  • Ensure that all documents and other sensitive data are adequately protected and access to the same is well documented and logged religiously.
     
  • No compromise/diversion from the existing policies defined whoever may be the person submitting a request.
     
  • If possible, install DLP (Data Loss Prevention) package based on your requirements.(ex: McAfee offers DLP)
  • Spread awareness amongst the employees and also educate them about the disciplinary actions that would be taken.
  • Keep a keen eye on any deviations from normal procedures/abnormal operations in all activities.

Comments

Popular posts from this blog

Learning Linux

Learning linux from the ground up is really a challenge. As you progress even more you start customizing your OS from how it starts and how it shutdown. As soon as you start on a Live CD your x server is pretty much either gnome or KDE. I mean it looks easy to do, but as soon as you start research how the x server it can get trick. My recommendation is to also learn the bash line or command prompt. if your good with the line commands then reconfiguring your computer shouldn't be a problem, but you just learn the GUI layer of it and not the line commands believe me your going to have hard time restoring your computer. As I ask people around they say linux is hard to install. The easiest way to partition your drive manually is like this. sda1 /home -- This is where you want to store all your data in case your linux gets corrupted. This space can be as big as you want sda2 /swap -- Linux is just like windows it needs it virtual space. The swap size depends on your phys...

Netwars Competition

The NetWars game is a collection of computer and network security challenges. It is designed to represent real-world security issues: their flaws and their resolutions. Each player can follow an independent path based on individual problem solving skills, technical skills, aptitude, and creativity. The game is played in a fun but safe environment using the technology that drives our lives every day. The game starts when a player downloads and starts a CD-ROM image on a PC or in a virtual environment such as VMware Player. The image contains a brief tutorial and the game's full instructions. The player must find a hidden key within the image that is downloaded and then uses that key to enter an online environment where knowledge of security vulnerabilities and their exploits can be turned into points. Upcoming Competitions   June 18-20, 2010 PST September 17-19, 2010 November 5-7, 2010 December 17-19, 2010 April 29 - May 1, 2011 Click Here to read more

Setting up your Linux Firewall Distribution (Part 1)

Today I'm going to show you how to get start. In order to create a network you must design it in paper, visio, or any kind of drawing that shows your plan. If you don't create some kind of drawing your network will not be very efficient. This drawing was done Microsoft new version of visio which is still in beta it called visio 2010 and yes I do have a legit license for it. The way that I design this is setup as two networks instead of one. Reason why you may ask because Network A is does not have a speed restriction and not monitor. Network B is has a speed limit and it is monitor. This is a basic drawing for this configuration. Remember the computer that your going to use must have at least two network cards. Let's break it down the red line named eth0 is your unfilter internet access which your trying to protect. eth1 is the green line which is your internal network which means that anything inside that network is protected. The blue line is optional, but I use it f...