Top Five Ways Insiders Exploit Networks
ION Networks reveals the top five ways insiders exploit your network
October 19, 2007
SOUTH PLAINFIELD, N.J. -- ION Networks, Inc. (OTCBB: IONN.OB), a leading provider of remote management and secure access products, today announced the release of the “Top Five Ways Insiders Exploit Your Network…and What You Can Do About It,” an article by ION CTO, Bill Whitney. The article highlights the most common ways insiders access and disrupt network resources, and the strategies enterprises can put in place to combat these threats.
The article serves as a response to the latest Computer Security Institute’s Computer Crime and Security Survey, which reported a 17% increase in insider threats. “As companies extend remote access and management privileges to an increasing number of employees, consultants, and service providers, they need to reevaluate their security measures. For a disgruntled insider, an environment that offers unrestricted, unpoliced access to privileged and highly valuable information can prove to be a strong temptation. Companies must put protections in place today or potentially suffer the consequences,” said Bill Whitney, CTO of ION Networks, Inc.
The article is free for download and is available on the ION web site at www.ion-networks.com. Direct link: http://www.ion-networks.com/solutions_resources.html.
ION Networks Inc. (Nasdaq: IONN)
You May Also Like