Most cases of insider abuse can be traced to individuals who are introverted, incapable of dealing
with stress or conflict, and frustrated with their job, office politics, and lack of respect or promotion.
Disgruntled employees may pass company secrets and intellectual property to competitors for
monitory benefits.
Here are some of the symptoms of a disgruntled employee:
A.
Frequently leaves work early, arrive late or call in sick
Limit access to the applications they can run on their desktop computers and enforce strict work
hour rules
B.
Spends time surfing the Internet or on the phone
By implementing Virtualization technology from the desktop to the data centre, organizations
can isolate different environments with varying levels of access and security to various employees
C.
Responds in a confrontational, angry, or overly aggressive way to simple requests or comments
Organizations must ensure that their corporate data is centrally managed and delivered to
users just and when needed
D.
Always negative; finds fault with everything
These disgruntled employees are the biggest threat to enterprise security. How do you deal with
these threats? (Select 2 answers)
Limit Internet access, e-mail communications, access to social networking sites and job hunting
portals
A.
Frequently leaves work early, arrive late or call in sick
Limit access to the applications they can run on their desktop computers and enforce strict work
hour rules
B.
Spends time surfing the Internet or on the phone
By implementing Virtualization technology from the desktop to the data centre, organizations
can isolate different environments with varying levels of access and security to various employees
C.
Responds in a confrontational, angry, or overly aggressive way to simple requests or comments
Organizations must ensure that their corporate data is centrally managed and delivered to
users just and when needed
D.
Always negative; finds fault with everything
These disgruntled employees are the biggest threat to enterprise security. How do you deal with
these threats? (Select 2 answers)
Limit Internet access, e-mail communications, access to social networking sites and job hunting
portals