Page 106 -
P. 106

SeCUrity GUiDe  Evolving Security






                    engages in a collaborative project with another firm? How   many or all of these activities are permitted in most states.   105
                    can team leaders be sure their corporate partners have been   Monitoring activities can be used to provide a fairly robust
                    evaluated with the same level of scrutiny?         picture of employee behavior. They can also be used to iden-
                       The hard truth is that these types of assurances can-  tify risk levels for each employee within the organization.
                    not  be made in most cases. Granting network access  to   For example, in a recent study  by Paul  Taylor at
                                                                                        11
                    outside collaborators can pose a considerable threat. A tem-   Lancaster  University,  researchers found  that employees
                    porary collaborator granted access to an internal network   who were planning to act maliciously changed the way they
                    could steal corporate data more easily than a cybercriminal     interacted with their coworkers. They started to use singu-
                      attacking it from the outside. In a way, it’s similar to trusting   lar pronouns (like I, me, or my) rather than plural pronouns
                    your siblings. You may trust your brother or sister, but do   (like us, we, or our). They became more negative, and their
                    you trust their friends?                           language became more nuanced and error-prone.
                                                                           Researchers are also developing new technologies that
                    Employee Monitoring                                can be used to monitor and interpret not only what users are
                    You may be wondering if there is anything employers can   typing or clicking on but also how they are typing and how
                    do  to mitigate  the risks of an insider  threat or a sketchy   they are moving their mouse. These measurements can then
                    corporate partner. Employers are increasingly monitoring   be used for any number of applications, like making sure you
                                                                                                   12
                    Internet usage, tracking GPS information on vehicles and   are not reusing corporate passwords  or identifying stress or
                    mobile devices, recording  keystrokes, monitoring social   anxiety while you are writing an email. By the time you enter
                                                 10
                      media activity, and reviewing emails.  While some of these   the workforce, almost everything you do for your company
                    activities are illegal for employers to conduct in some states,   has the potential to be monitored and analyzed!






                                QUeStionS



                    1.  This guide emphasizes how information security strat-  4.  How  do  you  feel  about  the  trend  of  companies  using
                      egy has changed over the past two decades due to ad-  new technologies to  monitor their  employees?  Would
                      vancements in technology. What do these changes mean   you want to work for a company that uses monitoring
                      for you personally in managing and securing your own   technologies? Why or why not?
                      personal systems and data?                       5.  Monitoring digital activity is not exclusive to the work-
                    2.  Take a few minutes to conduct an Internet search on   place. Internet service providers monitor your Web traf-
                      insider threats. Besides some of the high-profile cases of   fic, and many Web sites monitor everything that you do
                      employees stealing and selling or distributing corporate   while interacting with their site. What does this mean
                      data, what other examples can you find?             for users working from home? How might an ISP’s mon-
                    3.  What kinds of collaboration tools have you used to com-  itoring activities be a threat to corporations?
                      plete class assignments and  projects? Could  these col-
                      laboration tools pose a risk to you? How?
   101   102   103   104   105   106   107   108   109   110   111