Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.
These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.
IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.
Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)