9.5 Summary
Many security professionals refer to people as the
"weakest link" in the computer
security chain. The chain is weaker still when your employees and
users actively work to subvert your security from the inside. In
today's world, trusted individuals are increasingly
empowered to do great damage. The only way to protect yourself and
your organization is to implement policies and procedures designed to
weed out obvious bad actors and then carefully shepherd those who
remain.
|