SHARE
Facebook X Pinterest WhatsApp

Protecting Server Security from Internal Threats

Although the Department of Homeland Security and the televised news media would have you believe that hordes of foreign attackers and terrorists constantly prepare themselves for cyberwarfare, the reality is your greatest threat is currently occupying a cubicle inside your company. The majority of all computer security breaches are those launched by insiders taking advantage […]

Written By
thumbnail Kenneth Hess
Kenneth Hess
May 14, 2010
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Although the Department of Homeland Security and the televised news media would have you believe that hordes of foreign attackers and terrorists constantly prepare themselves for cyberwarfare, the reality is your greatest threat is currently occupying a cubicle inside your company. The majority of all computer security breaches are those launched by insiders taking advantage of their unrestrained access within the corporate network.

You might think these statements breed a certain amount of corporate paranoia, and they do. If you weren’t paranoid, you wouldn’t have network firewalls, antivirus and anti-spyware software, personal firewalls, or 12-character passwords on your accounts.

Potential Internal Security Risks

  • Employees
  • Contractors and consultants
  • Customers
  • Former employees
  • Temporary employees

Your systems come with built-in paranoia in the form of logging and file permissions. Additionally, you should consider a third-party solution that goes beyond those system-level schemes. For example, user activity management (UAM) is one method that reduces theft and unauthorized dalliances. Sure, accidents occur. People make mistakes by typing in the wrong system name, attempting to hit the wrong database or inadvertently accessing a resource for which they have no access. No one has any interest in wasting resources tracking or pursuing those innocent “door knockers.”

Read the rest at ServerWatch.

  SEE ALL
ARTICLES
 

Recommended for you...

Apple Doubles Bug Bounty to $2M for Zero-Click Exploits
Datamation Staff
Oct 13, 2025
New Spyware Masquerading as Messaging Apps Hits UAE Users
How Network Detection & Response (NDR) Works
Sarah Hunt
Oct 1, 2025
Europe Fails to Keep Pace with Rising Cyber Threats
Datamation Staff
Sep 29, 2025
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.