Академический Документы
Профессиональный Документы
Культура Документы
Within
By David M Upton & Sadie Crease
HBR Sept 2014
What cyber security consists off?
Communication security-protecting organization
communication media , technology , and content.
Revenge,
A number of
government and
private case studies
have established that
insiders who
knowingly participate
in cyberattacks have
a broad range of
motivations: Desire for recognition
and power,
Response to
blackmail,
How to Think About the Problem
Employ rigorous
Adopt a robust Look out for threats
Raise awareness. subcontracting Monitor employees.
insider policy. when hiring.
processes.
This should address Be open about It is more critical As the Target Let them know that
what people must likely threats so than ever to use breach you can and will
do or not do to that people can screening processes demonstrates, you observe their
deter insiders who detect them and be and interview must ensure that cyberactivity to the
introduce risk on guard against techniques designed your suppliers or extent permitted by
through anyone who tries to to assess the distributors dont law. You cannot
carelessness, get their assistance honesty of potential put you at riskby, afford to leave
negligence, or in an attack. hires. Examples for example, cybersecurity
mistakes. The Customize training include criminal minimizing the entirely to the
policy must be to take into account background checks, likelihood that experts; you must
concise and easy for what kinds of looking for someone at an raise your own day-
everyonenot just attacks workers in a misrepresentations external IT provider to-day awareness of
security and particular operation on rsums, and will create a back what is leaving your
technology might encounter. interview questions door to your systems as well as
specialiststo Phishing is a that directly probe systems. what is coming in.
understand, access, common way to a candidates moral
and adhere to. gain entry: compass.