The 10 Most Common Internal Security Threats

Who’s gaining access to your internal network? New criminal tactics and new kinds of malware are probing networks for vulnerabilities — and increasingly, finding them. We identify the top candidates for security breaches inside your own company

A recent buzzword in security is endpoint: any device that can connect to the corporate network, ranging from a desktop workstation to a laptop, PDA or even mobile phone. As the number of endpoints increases, firewalls and antivirus software are no longer adequate protection.

While external threats are as virulent as ever and need to be guarded against with firewalls and other defences, it is more important to pay attention to internal weaknesses

New tactics by criminals and new kinds of malware are probing networks for vulnerabilities. And increasingly, they are finding them. Fundamentally, experts say, endpoints are receiving more attention because of a sea change in the way computer networks are attacked.

In any attack, the first step is to get inside the organization's security perimeter. Traditionally, that has been done through an external threat, such as an infected e-mail message. Although there are still plenty of virus-laden e-mails, they are becoming less effective as attack vectors.

"Generally, security companies have done an excellent job on external threats," says Bill Piwonka, vice president of product management at Centennial Software, a maker of security software and sponsor of the blog

Join the newsletter!

Error: Please check your email address.
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

More about BillCentennial SoftwareEndPointsExposureGartnerGartnerKasperskyMicrosoftSophosYankee Group

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Rick Cook

Latest Videos

More videos

Blog Posts