What if you came to work tomorrow and found that your most trusted employee, who was your network administrator was stealing your customer database. There’s so little you can do to stop this kind of inside attack.
However you can try to be as careful as you can in hiring and having systems in place to try to keep your data as secure as possible and limit damage to data by one person (multiple authentication).
Information Week writes When it comes to current employees, IT managers must do something they might not have a taste for: Keep an eye out for insubordination, anger over perceived mistreatment, or resistance to sharing responsibility or training colleagues–all warning signs someone may be capable of system sabotage or data theft. “The biggest misconception about preventing insider attacks is that IT needs to worry only about technology issues and HR has to worry only about personnel issues,” Cappelli says.
As a small business without all the resources of a larger business you don’t have the money to do extensive background checks on each new hire and have multiple layers of management security.
However, getting references, observing character and have a good relationship with your employees can help you detect a “bad apple”.
Managers must not only monitor system access, but also let employees know their system changes can be tracked. Employers should be wary of people unwilling to share their knowledge about systems or uncomfortable with the fact that their activities accessing systems or data can be tracked. – writes Information Week.
Latest posts by Ramon Ray (see all)
- 5 Tips To Choosing Your Marketing Automation Provider - December 16, 2016
- GoDaddy Enhances Mobile Shopping With ApplePay and Shopping Cart Intelligence - December 14, 2016
- 3 Reasons Invoicing Apps Are Essential For Fledgling Businesses - November 28, 2016