Tuesday, 9 May 2017

3 Steps to Protect Your Data During The High Risk Exit Period

How to determine who is a high risk employee within your company. Learn More >>

Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you've "trusted" them as part of their employment, but when the time comes to change jobs, you can't always be certain about the motive for the move. The assumption should always be they're leaving to go to a competitor; while you normally hope for the best, you should expect and plan for the worst.

Learn More

Here is another piece of content we thought you'd be interested in:

The fact that trusted employees or contractors often create problems for the organizations they work for, is unfortunate, but remains a fact. But why? Companies take steps to protect themselves against the risks that are inherent when bringing in new people. Interviews, background checks, reference checks, etc., are all designed to mitigate risk. Unfortunately, it's never enough. This White Paper will present some common sense suggestions for improving the "beginning of the life cycle" risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, weĆ¢€™ll look at how to tie the efforts made at the beginning of the life cycle to the rest of the employee life cycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.

Learn More

Additional Resources

Top Reasons Network Based Security Fails

The 6 Essential Requirements for Managing ADCs