Previously we looked at how to manage internal threats by means of physical security, controlling access and creating complex passwords. In this issue, we’ll share some email security tips to help safeguard your systems from within and introduce some tools that can monitor your network for suspicious activity.
First, an interesting IT security statistic: 52 percent of data breaches arise from accidental leaks and vulnerabilities, according to a recent global study by International Data Group. Only 19 percent of insider threats were considered deliberate, while 26 percent were a combination of intentional and accidental breaches of security. (more…)