How do you deal with these threats?

Most cases of insider abuse can be traced to individuals who are introverted, incapable of dealing with stress or conflict, and frustrated with their job, office politics, and lack of respect or promotion. Disgruntled employees may pass company secrets and intellectual property to competitors for monitory benefits.

Here are some of the symptoms of a disgruntled employee:
+ Frequently leaves work early, arrive late or call in sick
+ Spends time surfing the Internet or on the phone
+ Responds in a confrontational, angry, or overly aggressive way to simple requests or comments
+Always negative; finds fault with everything

These disgruntled employees are the biggest threat to enterprise security.

How do you deal with these threats? (Select 2 answers)

Most cases of insider abuse can be traced to individuals who are introverted, incapable of dealing with stress or conflict, and frustrated with their job, office politics, and lack of respect or promotion. Disgruntled employees may pass company secrets and intellectual property to competitors for monitory benefits.

Here are some of the symptoms of a disgruntled employee:
+ Frequently leaves work early, arrive late or call in sick
+ Spends time surfing the Internet or on the phone
+ Responds in a confrontational, angry, or overly aggressive way to simple requests or comments
+Always negative; finds fault with everything

These disgruntled employees are the biggest threat to enterprise security.

How do you deal with these threats? (Select 2 answers)

E.
Limit access to the applications they can run on their desktop computers and enforce strict work hour rules

F.
By implementing Virtualization technology from the desktop to the data centre, organizations can isolate different environments with varying levels of access and security to various employees

G.
Organizations must ensure that their corporate data is centrally managed and delivered to users just and when needed

H.
Limit Internet access, e-mail communications, access to social networking sites and job hunting portals



Leave a Reply 8

Your email address will not be published. Required fields are marked *


cristina

cristina

E and H ? 🙂

AnonymousToo

AnonymousToo

I’d say F and G

Anonymous 2

Anonymous 2

F amd G right?

hannah

hannah

you guys are joking right…

helo

helo

It’s H & G. Why the hell would you use Virtualization? Admin needs to fix this question, as a,b,c,d are not actual answers, but part of the question.

admin

admin

Yes, it’s wrong format. I fixed it.
Thanks all.

tony

tony

I think ansers is
F.
By implementing Virtualization technology from the desktop to the data centre, organizations can isolate different environments with varying levels of access and security to various employees

G.
Organizations must ensure that their corporate data is centrally managed and delivered to users just and when needed

Don

Don

E and H. Tip off is the work hours enforcement for E. That and making sure the disgruntled employee (or any employee) can’t run software that could be detrimental to the company. Like your normal employee has no need to run netsh.