- Major Studies
- Advisory Reports
- Valuation Data
Malicious insider threats, from espionage to sabotage, have always been one of the most potent security risks confronting organizations. This special report, Malicious Insider Threats, provides a full breakdown of the different forms that these threats can take, what organizations are most worried about, and what counter-measures they are taking.
This report is based on our survey of IT security professionals and IT executives worldwide. It analyzes malicious insider threats to businesses--that is, deliberate violations of an organization's security policy by individuals within an organization. Basic categories of malicious threats include accessing confidential information without authorization, disclosing confidential information, executing fraudulent transactions, and sabotage of the organization’s systems, network, or data.
For each of these four categories of threat, we present data concerning the perceived seriousness of the threat and actual incidents and risks of each type. We then analyze the popularity of various methods for preventing, countering, and detecting incidents of malicious insider activity.
Purchase the full report: Malicious Insider Threats.
Or, read the Research Byte, which provides an extract of the full report.
Table of Contents
List of Figures