{"id":545,"date":"2017-03-08T22:15:16","date_gmt":"2017-03-08T22:15:16","guid":{"rendered":"http:\/\/192.168.1.90\/?p=545"},"modified":"2017-03-09T02:02:30","modified_gmt":"2017-03-09T02:02:30","slug":"what-is-inside-view-vulnerability-and-how-can-you-prevent-it","status":"publish","type":"post","link":"https:\/\/guidance-consulting.com\/what-is-inside-view-vulnerability-and-how-can-you-prevent-it\/","title":{"rendered":"What is Inside View Vulnerability and How Can You Prevent It?"},"content":{"rendered":"<p>Inside view vulnerability is the risk your company faces from an employee or an insider to the company attacking your system. Businesses tend to trust their employees implicitly, and while most of them deserve this trust, there are a few things you can do to help reduce your risk of an inside attack.<\/p>\n<p>The most common culprit is the disgruntled employee. These inside jobs are usually not very sophisticated, and are often performed by employees who do not have system administrator status. They can still do plenty of damage, so it&#8217;s important to limit the amount of access any one employee has to ensure that they can only access data and resources that specifically apply to their job. Some of the more common ploys are stealing data to sell to outside parties, or the less harmful, but still unconscionable, peeking into employee records to look at their salaries. Your inside view vulnerability may also surface through unintentional risk-taking, such as taking work home. If the employee loses the files or laptop, it is your proprietary data out in the world, not to mention a huge security risk for the clients who have put their trust in you.<\/p>\n<p>Terminated employees are another risk. They may be angry, and it&#8217;s important to minimize the amount of damage they can do on their way out. Be sure that all access for these employees is immediately terminated, and regularly change all passwords and logins company-wide. The employee\u00e2\u20ac\u2122s access may have been removed, but if they know another employee&#8217;s login information, that&#8217;s another route into your system.<\/p>\n<p>Sometimes the person attacking with insider knowledge is, or was, a system administrator. If you find that someone has uploaded spyware or is infiltrating your network illicitly, take that computer offline immediately. If you find even one piece of malware, it&#8217;s likely there are more. Back-up your data files and reinstall your system from the original disks and also change the root password. It&#8217;s a hassle, but it&#8217;s better to take action now than to worry about what could be coming next.<\/p>\n<p>What can you do to reduce your inside view vulnerability?<\/p>\n<ul>\n<li>Familiarize yourself with insider threat research.<\/li>\n<li>Regularly revisit your security protocols to make sure that your security is up-to-date, and is also being properly implemented.<\/li>\n<li>Run background checks on your employees. As many as one-third of inside hackers have criminal records!<\/li>\n<li>Plan in advance how to mitigate the damage if there is an inside attack.<\/li>\n<li>Educate your managers about the risks so they can be aware.<\/li>\n<\/ul>\n<p>You can reduce the amount of inside view vulnerability you have. Taking the time to tighten security loopholes and to plan how to handle an attack can make the difference between a large loss and the ability to mitigate the damage and keep your company running smoothly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Inside view vulnerability is the risk your company faces from an employee or an insider to the company attacking your system. Businesses tend to trust their employees implicitly, and while most of them deserve this trust, there are a few things you can do to help reduce your risk of an inside attack. The most [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[32,33,28,29,30,31],"class_list":["post-545","post","type-post","status-publish","format-standard","hentry","category-security-management","tag-anti-virus-software","tag-denial-of-service-attacks","tag-vulnerability-management","tag-vulnerability-management-development","tag-vulnerability-management-program","tag-vulnerability-scanning-tools"],"_links":{"self":[{"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/posts\/545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/comments?post=545"}],"version-history":[{"count":1,"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/posts\/545\/revisions"}],"predecessor-version":[{"id":546,"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/posts\/545\/revisions\/546"}],"wp:attachment":[{"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/media?parent=545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/categories?post=545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/guidance-consulting.com\/wp-json\/wp\/v2\/tags?post=545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}