Malicious Insiders

Ethical Issues in Information Technology



What are the solutions to combat malicious insiders? If I really knew the answer I would be an independent contractor making $25,000 dollars a week training businesses on how to prevent this sort of thing from happening. The truth is this sort of activity will always occur because you cannot control people's actions, their way of thinking, or what their values are. Businesses just have to keep a more vigilant watch on what their employees are allowed to do. Here are just a few examples IT workers can try to implement in their place of employment:

  • Learn from your mistakes
  • Study past breeches of security
  • Implement policies and procedures for use of personal devices
  • Make stronger passwords
  • Prior to hiring sign Nondisclosure agreements
  • Rotate employees regularly to ensure not one employee holds the key to the castle

I think the best advice a business can follow is to prepare policies and procedures for computer usage and implement some in house training. Then follow up with it on a bi-weekly, monthly, semi-annual, and yearly basis.