In-Depth
Podcast: Securing the Enterprise from Employee Activities
After you’ve protected your environment from outside threats such as viruses, it’s time to turn your attention inward and protect against threats from your employees themselves.
If yours is like most IT organizations, you’ve already protected your environment from outside threats such as viruses. It’s time to turn your attention inward and look at another big threat. It comes from your employees themselves. For example, your organization can suffer when an employee takes a screen capture of a CAD drawing and sends it via Web mail to an unauthorized third party.
Monitoring technologies can help prevent such problems, whether the behavior is unintentional or deliberate. To discuss why monitoring is needed, what it does, and an unexpected but important benefit you’ll get from using it, we sat down with Tom Bennett, vice president of marketing for Raytheon Oakley Systems.
How to Listen
Listen to Previous Podcasts
Check out all our earlier interviews at our Podcast Archive page.