sponsored by Lumension
Posted:  02 Feb 2009
Published:  02 Feb 2009
Format:  PDF
Length:  8  Page(s)
Type:  White Paper
Language:  English

Information security experts are bracing for the law of unintended consequences to swing into action in 2009 as layoffs, downsizing and low morale bring the worst out of trusted insiders looking to profit off of proprietary intellectual property, customer contact lists, trade secrets and any other sensitive information. Many employees have admitted as much themselves in recent surveys - last December the majority of participants in a survey reported that if they were fired tomorrow they would definitely take company data with them to their next employer. To neutralize the threats posed by insiders with ample motivation, IT departments must take away the means and the opportunities to commit crimes. In this whitepaper you will learn how employees and partners are engaging with your IT assets and intellectual property as well as key steps to prevent this new insider threat within your organization.

Continuous Data Protection | Continuous Data Protection Software | Data Management | Data Security | Database Security | Device Control Software | Intellectual Property | Risk Management | USB | Vulnerability Management

View All Resources sponsored by Lumension

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement