Quantcast
Channel: Security Boulevard
Viewing all articles
Browse latest Browse all 37364

Analyzing the Poneman study on privileged users: 3 steps to build your process for employee access rights

$
0
0

 You trust your employees and administrators with the most critical technical functions in your organization - but they're only human. Curiosity gets the best of everyone eventually, and when it does do you trust your technical controls to keep those that are manning the ship from peeking at its secrets? How much access do those employees and system administrators have to your critical intellectual property, company secrets and other secret information - and how often do they take a peek behind the curtain ...you know, just for curiosity? The new study by the Ponemon institute, sponsored by HP Enterprise Security and released recently.



Viewing all articles
Browse latest Browse all 37364

Trending Articles