Why are internal threats oftentimes more successful than external threats?

Answer Posted / chaitanya

When you see something day in and day out, even if it shocks you at first, you tend to get used to it. This means that if you see somebody that pokes around day after day, month after month, you might get used to the fact that he’s just curious. You let your guard down, and don’t react as quickly to possible threats. On the other hand, say for example you have an annoyed employee that is soon to be fired and wants to show his soon to be former employer that he can bring them down, so he sells his still active credentials and card-key to a local group that specializes in white-collar crime. Still other infiltrators dress up as delivery people and wander around aimlessly in office buildings, getting information off of post-it notes and papers lying around. External threats do not have access to near this level of information about the company, and more often than not do not get in as far as somebody that spent 20 bucks on a knock-off UPS uniform.

Is This Answer Correct ?    1 Yes 3 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is a table in computer?

550


How would you login to Active Directory from a Linux or Mac box?

1305


What is the most commonly used computer application?

543


What is a driver in computer?

541


What is a spooler on a computer?

565






What are the most common computer applications?

554


 What is Exfiltration?

1422


What is dora process in DHCP and how it works?

2443


What is meant by computer application?

549


What is database in a computer?

607


What is data source in computer?

560


Is a console a computer?

560


Does indexing slow down computer?

576


I’m the CEO of a Fortune 500 company. I make more in an afternoon than you make in a year. I don’t care about this stupid security stuff, it just costs time and money and slows everything down. Why should I care about this junk?

1344


What is the difference between a virus and a trojan?

619