Senin, 12 Desember 2011

People as dangerous hackers


Among the topics covered in the report of the State of Symantec Security Survey 2011, one of the attack vectors are combined, the fastest-growing internal threats. Wish this was in spite of the threat from without, which takes the data to steal. For this purpose, the companies were asked to remain vigilant. "The attack is a very dangerous person, because they know that the data of the organization or the customer," said Andi Francis Indromojo, Symantec Technical Consultant in Indonesia in Jakarta, 28 October 2011. "Based on the data, the insider threat has reached 42 percent, while the threat of industrial espionage by competitors reached 45 percent," he said. In addition, said Frans, if someone in the loop. "It is dangerous because it can generate data for the buying and selling," he added. Francis said there are two categories of threats posed by insiders, people who do not understand the safety and insiders to understand computer security, who at that time the enemy in the blanket. To this end, Symantec recommends business or organization should be the policy is to establish computer security tight. "Users should not casually teretentu access to the links, it should be tight," Francis advises. "This must be coupled to create a healthy system of reward and punishment. The policy is not enough," he said. Frank must continue to protect company information proactively by an approach that focuses on the protection of information and interaction. Fully equipped with the control data that is important to protect for companies or organizations. "Do not forget to check the identity, because the username and current password is often impaired. IT administrators need to protect the infrastructure by securing their general evaluation criteria," said Frans said. "The organization or company must also quick intelligence and ongoing assessment of malicious programs in response to the threat," he said. According to Frank, now a growing threat not only to the business category is to attack, but it has all category that includes personal or home invaded. "Small and medium enterprises (SMEs), small businesses are also at risk because they are used primarily in IT

0 komentar:

Posting Komentar

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review