SlideShare a Scribd company logo
4 Employees Putting Your Business
At Risk
2
Who, Me?
As a security team, your
focuses are on role-based
access, segregation of duties,
and making sure the right
people have the right access to
the right things at the right time.
But what about the employees
within other functions? Are
there employees who are
putting you at an uncommon
risk?
Here is a look into those
employees and how you can
mitigate their risk.
3
The Contemporary Creative
Who they are:
• Driven to get the job done
in the most creative and
innovative way possible
• Seeks ways to work
around or bend rules to
get the job done
• Curious about the latest
and greatest technology
4
The Contemporary Creative
How to mitigate their risk:
These innovators may be
great at their jobs but they
also need to be reigned into
your security parameters and
need to understand what can
and cannot be connected to
the network.
How they can hurt you:
By bending the rules and
using unapproved new
technology, they are
opening up your network to
breaches.
The rise of BYOD and
cloud computing has
increased their digital
footprint and your risk.
5
The Intern
Who they are:
• Interns can be seasonal
or a yearly addition to
your team
• In order to be credible,
they need access to
certain applications
• They may need access
to high-level information
based on what they or
their bosses are working
on
6
The Intern
How they can hurt you:
Without proper training,
they will not understand the
risks they pose to the
system.
As a temporary member of
the staff, their termination
may be overlooked and
their access may not be cut
off.
How to mitigate their risk:
All interns should be
trained to enforce the
importance of being
security-minded and
knowing the risks they
pose to the system. Once
their term is over, make
sure their access is cut off
as you would with any
other termination.
7
The Bad Apple
Who they are:
• Not quite corporate
espionage but
employees who are
disgruntled and have
access to highly
sensitive information
with any chance of
exploiting it
• Look for who is taking
information to see if they
really need it
8
The Bad Apple
How to mitigate their risk:
You need the ability to see
when critical information is
being downloaded by these
employees outside of their
role. Look for accounts with
privileged access,
especially above their role,
and keep an eye on all
activities.
How they can hurt you:
Disgruntled employees
often take proprietary
information and hoard it
before leaving
They can either take this
information with them to a
competitor or simply
release it breaching your
security protocol
9
The Apathetic
Who they are:
• Team members who are
too lazy to learn the
security policy or to
learn new systems in
order to help keep
themselves and their
organizations safe
10
The Apathetic
How they can hurt you:
By using easy passwords,
not keeping them secure,
and not changing them
often enough
By being an apathetic
approver who grants
access without asking
questions
How to mitigate their risk:
Intensively train these
employees on all security
protocols and make sure
they understand the
importance of being a
security minded culture.
Put in place automatic
password updates, security
updates and news, and
mandatory training
programs
11
What’s next?
Are any of these employee categories part of your
organization?
Are you prepared for the risks they bring?
Do you know what risks are currently in your system?
Let Courion help.
With a Quick Scan of your systems, we can show you
where your critical risks lie and how to secure them.
Request a Quick Scan >>

More Related Content

What's hot

Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
Marc Vael
 
How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?
John Wallix
 
How to Enhance Vulnerability Management with Intelligence plus Analytics
How to Enhance Vulnerability Management with Intelligence plus AnalyticsHow to Enhance Vulnerability Management with Intelligence plus Analytics
How to Enhance Vulnerability Management with Intelligence plus Analytics
Aujas
 
Train Employees to Avoid Cybercrime
Train Employees to Avoid CybercrimeTrain Employees to Avoid Cybercrime
Train Employees to Avoid Cybercrime
Human Resources & Payroll
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
Major Hayden
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Tripwire
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 
Assessing Your security
Assessing Your securityAssessing Your security
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
ThinAir
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber Security
Antti Ollila
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
Angela Samuels
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal Professionals
Shawn Tuma
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
Dtex Systems
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks International
 
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
Symantec
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
Priscila Bernardes
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
centralohioissa
 

What's hot (20)

Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?How Can you Identify your Next Insider Threat?
How Can you Identify your Next Insider Threat?
 
How to Enhance Vulnerability Management with Intelligence plus Analytics
How to Enhance Vulnerability Management with Intelligence plus AnalyticsHow to Enhance Vulnerability Management with Intelligence plus Analytics
How to Enhance Vulnerability Management with Intelligence plus Analytics
 
Train Employees to Avoid Cybercrime
Train Employees to Avoid CybercrimeTrain Employees to Avoid Cybercrime
Train Employees to Avoid Cybercrime
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber Security
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal Professionals
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
 
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
INFOGRAPHIC: What's Your's Is Mine - How Employees are Putting Your Intellect...
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 

Viewers also liked

US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12
US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12
US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12Wafik El-Deiry, MD PhD FACP
 
Programma Utrecht 2015, Le Grand Départ
Programma Utrecht 2015, Le Grand DépartProgramma Utrecht 2015, Le Grand Départ
Programma Utrecht 2015, Le Grand Départ
Sergueï Markovic
 
SR Cloud Web Verification for HP Teleform
SR Cloud Web Verification for HP TeleformSR Cloud Web Verification for HP Teleform
SR Cloud Web Verification for HP Teleform
Marie Cooper
 
Slimwoner in-22-stappen
Slimwoner in-22-stappenSlimwoner in-22-stappen
Slimwoner in-22-stappen
Sergueï Markovic
 
Nehengajara
NehengajaraNehengajara
Nehengajara
Rodolfo Lobato
 
Permendikbud nomor-64-tahun-2013-ttg-si
Permendikbud nomor-64-tahun-2013-ttg-siPermendikbud nomor-64-tahun-2013-ttg-si
Permendikbud nomor-64-tahun-2013-ttg-si
M. ALI AMIRUDDIN
 
TenthWindow Company Portfolio
TenthWindow Company PortfolioTenthWindow Company Portfolio
TenthWindow Company Portfolio
Ghasem Vahedi
 
4 Ways to Defend Against Internal Attacks
4 Ways to Defend Against Internal Attacks4 Ways to Defend Against Internal Attacks
4 Ways to Defend Against Internal Attacks
Kevin O'Connor
 
Uts smplb c kls vii smt 2, 2013/2014 pendidikan agama islam
Uts smplb c  kls vii smt 2, 2013/2014 pendidikan agama islamUts smplb c  kls vii smt 2, 2013/2014 pendidikan agama islam
Uts smplb c kls vii smt 2, 2013/2014 pendidikan agama islamM. ALI AMIRUDDIN
 
Soal uts smt 2 pkn kls vii smplb c 2013/2014
Soal uts smt 2 pkn kls vii smplb c 2013/2014Soal uts smt 2 pkn kls vii smplb c 2013/2014
Soal uts smt 2 pkn kls vii smplb c 2013/2014M. ALI AMIRUDDIN
 

Viewers also liked (15)

CBT 4-16-11
CBT 4-16-11CBT 4-16-11
CBT 4-16-11
 
US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12
US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12
US Senator Pat Toomey visits El-Deiry Lab at Penn State 4-23-12
 
Programma Utrecht 2015, Le Grand Départ
Programma Utrecht 2015, Le Grand DépartProgramma Utrecht 2015, Le Grand Départ
Programma Utrecht 2015, Le Grand Départ
 
SR Cloud Web Verification for HP Teleform
SR Cloud Web Verification for HP TeleformSR Cloud Web Verification for HP Teleform
SR Cloud Web Verification for HP Teleform
 
Slimwoner in-22-stappen
Slimwoner in-22-stappenSlimwoner in-22-stappen
Slimwoner in-22-stappen
 
Nehengajara
NehengajaraNehengajara
Nehengajara
 
AACR Social Media 4-14-15 final version
AACR Social Media 4-14-15 final versionAACR Social Media 4-14-15 final version
AACR Social Media 4-14-15 final version
 
Permendikbud nomor-64-tahun-2013-ttg-si
Permendikbud nomor-64-tahun-2013-ttg-siPermendikbud nomor-64-tahun-2013-ttg-si
Permendikbud nomor-64-tahun-2013-ttg-si
 
TenthWindow Company Portfolio
TenthWindow Company PortfolioTenthWindow Company Portfolio
TenthWindow Company Portfolio
 
4 Ways to Defend Against Internal Attacks
4 Ways to Defend Against Internal Attacks4 Ways to Defend Against Internal Attacks
4 Ways to Defend Against Internal Attacks
 
MKSAP 16 7-18-15
MKSAP 16 7-18-15MKSAP 16 7-18-15
MKSAP 16 7-18-15
 
Uu nomor 8 tahun 2012
Uu nomor 8 tahun 2012Uu nomor 8 tahun 2012
Uu nomor 8 tahun 2012
 
Uts smplb c kls vii smt 2, 2013/2014 pendidikan agama islam
Uts smplb c  kls vii smt 2, 2013/2014 pendidikan agama islamUts smplb c  kls vii smt 2, 2013/2014 pendidikan agama islam
Uts smplb c kls vii smt 2, 2013/2014 pendidikan agama islam
 
Soal uts smt 2 pkn kls vii smplb c 2013/2014
Soal uts smt 2 pkn kls vii smplb c 2013/2014Soal uts smt 2 pkn kls vii smplb c 2013/2014
Soal uts smt 2 pkn kls vii smplb c 2013/2014
 
Nick Vujicic
Nick VujicicNick Vujicic
Nick Vujicic
 

Similar to Any of these folks work with you?

Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
johnjamesahearn
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesMidmarketIBM
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
bagotjesusa
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Sandra (Sandy) Dunn
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
infosec train
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
Daniel Rivas
 
Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English edition
Chuan Lin
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
Michael O'Phelan
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Robi Sen
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
Caroline Johnson
 
Your're Special (But Not That Special)
Your're Special (But Not That Special)Your're Special (But Not That Special)
Your're Special (But Not That Special)
Sandra (Sandy) Dunn
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
Md. Sajjat Hossain
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
Concept Searching, Inc
 
Ahearn security-presentation
Ahearn security-presentationAhearn security-presentation
Ahearn security-presentation
johnjamesahearn
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
johnjamesahearn
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
Rogers Communications
 

Similar to Any of these folks work with you? (20)

Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
 
Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English edition
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Your're Special (But Not That Special)
Your're Special (But Not That Special)Your're Special (But Not That Special)
Your're Special (But Not That Special)
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Ahearn security-presentation
Ahearn security-presentationAhearn security-presentation
Ahearn security-presentation
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 

Any of these folks work with you?

  • 1. 4 Employees Putting Your Business At Risk
  • 2. 2 Who, Me? As a security team, your focuses are on role-based access, segregation of duties, and making sure the right people have the right access to the right things at the right time. But what about the employees within other functions? Are there employees who are putting you at an uncommon risk? Here is a look into those employees and how you can mitigate their risk.
  • 3. 3 The Contemporary Creative Who they are: • Driven to get the job done in the most creative and innovative way possible • Seeks ways to work around or bend rules to get the job done • Curious about the latest and greatest technology
  • 4. 4 The Contemporary Creative How to mitigate their risk: These innovators may be great at their jobs but they also need to be reigned into your security parameters and need to understand what can and cannot be connected to the network. How they can hurt you: By bending the rules and using unapproved new technology, they are opening up your network to breaches. The rise of BYOD and cloud computing has increased their digital footprint and your risk.
  • 5. 5 The Intern Who they are: • Interns can be seasonal or a yearly addition to your team • In order to be credible, they need access to certain applications • They may need access to high-level information based on what they or their bosses are working on
  • 6. 6 The Intern How they can hurt you: Without proper training, they will not understand the risks they pose to the system. As a temporary member of the staff, their termination may be overlooked and their access may not be cut off. How to mitigate their risk: All interns should be trained to enforce the importance of being security-minded and knowing the risks they pose to the system. Once their term is over, make sure their access is cut off as you would with any other termination.
  • 7. 7 The Bad Apple Who they are: • Not quite corporate espionage but employees who are disgruntled and have access to highly sensitive information with any chance of exploiting it • Look for who is taking information to see if they really need it
  • 8. 8 The Bad Apple How to mitigate their risk: You need the ability to see when critical information is being downloaded by these employees outside of their role. Look for accounts with privileged access, especially above their role, and keep an eye on all activities. How they can hurt you: Disgruntled employees often take proprietary information and hoard it before leaving They can either take this information with them to a competitor or simply release it breaching your security protocol
  • 9. 9 The Apathetic Who they are: • Team members who are too lazy to learn the security policy or to learn new systems in order to help keep themselves and their organizations safe
  • 10. 10 The Apathetic How they can hurt you: By using easy passwords, not keeping them secure, and not changing them often enough By being an apathetic approver who grants access without asking questions How to mitigate their risk: Intensively train these employees on all security protocols and make sure they understand the importance of being a security minded culture. Put in place automatic password updates, security updates and news, and mandatory training programs
  • 11. 11 What’s next? Are any of these employee categories part of your organization? Are you prepared for the risks they bring? Do you know what risks are currently in your system? Let Courion help. With a Quick Scan of your systems, we can show you where your critical risks lie and how to secure them. Request a Quick Scan >>

Editor's Notes

  1. Vector art provided by <a href="http://www.freepik.com/free-photos-vectors/people">People vector designed by Freepik</a>