Impact | Understanding and Managing Business Risk

Subscribe

Blog Editors

Topics

Archives

By Lucie Huger, Andrew Hartnett on March 22, 2017 at 10:47 AM

Hand stopping data, concept of software protectionIn our last post, we talked about what insider threats are and why it is so important to consider them as you construct your data security policies.  The heart of an effective strategy to minimize risks from insider threats is the concept of access controls – limiting users’ privileges to the minimum necessary – but access controls alone are not enough.

Facebook Twitter LinkedIn Google+ Email

This website uses cookies to improve functionality and performance. If you choose to continue browsing this website, you consent to the use of cookies. Read our Privacy Policy here for details.