Access Management and User Accountability for WLANs

By | January 12, 2005

“We have met the enemy, and he is us.” Read the latest FBI/CSI Computer Crime and Security Survey, and that adage from the old Pogo comic strip is likely to be your conclusion.

The survey found that insider abuse of network access was the second most common form of network attack. Insider abuse was reported by 80% of survey respondents—second only to virus incidents (82%). And—just as astonishing—disgruntled employees (77%) were ranked just behind independent hackers (82%) as a likely source of attacks.

As these numbers show, organizations who want to secure their networks need to do more than erect a defensive perimeter to keep out strangers. They need to find a way to prevent attacks from insiders, as well.

Read the full paper in PDF here

Leave a Reply