What You Should DoBy Larry Dignan | Posted 2003-03-01 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
Disgruntled insiders have always been the biggest threat to your network. But now geopolitical tensions raise the ante on checking backgrounds of those you think you can trust.Checking Backgrounds">
What You Should Do Checking Backgrounds
Conduct thorough background checks on part-time, full-time and contract workers.
Use legal and human resource departments to find available records, from all sources. Implement checks.
Monitor your network for unusual activity and server requests.
Most security is focused on attacks from the outside.