What You Should DoBy Larry Dignan | Posted 2003-03-01 Email Print
Know the Risk: Digital Transformation's Impact on Your Business-Critical Applications REGISTER >
Disgruntled insiders have always been the biggest threat to your network. But now geopolitical tensions raise the ante on checking backgrounds of those you think you can trust.Checking Backgrounds">
What You Should Do Checking Backgrounds
Conduct thorough background checks on part-time, full-time and contract workers.
Use legal and human resource departments to find available records, from all sources. Implement checks.
Monitor your network for unusual activity and server requests.
Most security is focused on attacks from the outside.