Home > Articles > Access Management and User Accountability for WLANs

Access Management and User Accountability for WLANs

January 12th, 2005

“We have met the enemy, and he is us.” Read the latest FBI/CSI Computer Crime and Security Survey, and that adage from the old Pogo comic strip is likely to be your conclusion.

The survey found that insider abuse of network access was the second most common form of network attack. Insider abuse was reported by 80% of survey respondents—second only to virus incidents (82%). And—just as astonishing—disgruntled employees (77%) were ranked just behind independent hackers (82%) as a likely source of attacks.

As these numbers show, organizations who want to secure their networks need to do more than erect a defensive perimeter to keep out strangers. They need to find a way to prevent attacks from insiders, as well.

Read the full paper in PDF here

Articles

Comments are closed.