Menu
Menu
The 10 Most Common Internal Security Threats

The 10 Most Common Internal Security Threats

Who’s gaining access to your internal network? New criminal tactics and new kinds of malware are probing networks for vulnerabilities — and increasingly, finding them. We identify the top candidates for security breaches inside your own company

5.Missing Security Agents. Many companies require agents to be installed on all their endpoints. These agents may monitor network traffic, make sure patches are up to date, or track and report on stolen computers. However, requiring such agents and actually having them installed are two different things. About 1.2 percent of the endpoints that were supposed to have such agent software installed didn't.

Publicize your use policies and monitor your network to make sure the policies are being followed

According to Kolter, the next five issues each showed up in less than 1 percent of the sample.

6.Unauthorized Remote-Control Software. Remote-control software is invaluable for troubleshooting hardware and software. Unauthorized remote-control software is invaluable to the bad guys as well since it offers a royal road into the computer.

In some cases, remote-control software, such as pcAnywhere, is installed by a user who wants to be able to access the desktop from elsewhere. In other cases, the installation is a rogue, with software either installed or modified to allow a third party to use the system without the user's knowledge or consent.

In spite of the obvious danger, the survey found nearly 1 percent (0.82 percent) of the computers surveyed had remote-control software installed that wasn't supposed to be there.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about BillCentennial SoftwareEndPointsExposureGartnerGartnerKasperskyMicrosoftSophosYankee Group

Show Comments
Computerworld
ARN
Techworld
CMO