External and Internal Threats
External threats often refer to external forces outside the organization that uses malicious ways to get unauthorized access to the organization for ad intentions. Besides, they are usually after sensitive data that will damage the organization in one way or another. According to Peltier(2014), to prevent external threats, an organization has to implement counter security measures. This implies that first, you have to evaluate your system to derive the weak areas or identify vulnerabilities in the systems that could be exploited and sort them out. Second, train your employees on the aspects of security threats and how to handle them. Finally, retract excessive privileges from the workers and embrace new technologies such as the cloud.
Internal threats occur inside the organization mostly done y the employees themselves. Solms (2009) argues that in most cases, employees are irritated, for example missing on a promotion or lack of salary increase. Organization comes up with countermeasures concerning the prevention of internal attacks. First, you will train your employees on the workings of security measures to enable them to know what is at stake. Second, the physical location of data should be protected at all costs. Also, best practices should be applied when dealing with password security. For disgruntled employees, install a user action monitoring program that will keep tabs with the particular employees. Moreover, ensure the access to sensitive data in the organization is restricted to only reliable and dependable personnel. In the event, the irritated employees get worse; the best way is to replace them with competent workers.
The individuals that become external and internal threats are identifying y monitoring an abnormal behavior in the organization. This implies that anything out of the norm usually gives them away. For example, an external threat posing as a technician only to cross-check credentials to discover they are fake or non-existence after the individual exposes suspecting behavior.
Reference
H., V. S., & Solms, R. V. (2009). Information security governance. New York: Springer.
Peltier, T. R. (2014). Information security fundamentals. Boca Raton: CRC Press, Taylor & Francis Group.