![]() ![]() |
This may seem like an easy question, but it continues to be a challenge for companies.
Just last week, UK-based Morrisons supermarket chain announced that information of 100,000 employees, including bank details and addresses, was stolen and posted online. An arrest has been made. However, the thief wasn’t an outside hacker … but was an internal employee.
Preventing employee information theft
To adequately monitor the network there are a number of steps involved:
These steps align to the “People, Process, Technology” triad where removing any one will result in a failure, either sooner or later. Conversely, choosing the right approach to each of these will make a significant impact on how well you can monitor and detect issues.
Selecting the appropriate technology is very important as both the process and people will directly interact with the technology. A technology that is either too complex to support and implement or not sophisticated enough will mean you will not be able to achieve the level or monitoring required … at least not as cost effectively!
When evaluating a monitoring solution, be sure to look for the following:
Want to learn how AccelOps can help you monitor access to your network? Contact us; we’re here to help.