May 19, 2011 – I read with great interest a recent posting on CSO concerning what they called the “three types of insider threat” to organizations, enterprises and systems. With data and confidential information at the heart of the insurance enterprise, such threats must obviously be addressed.

The piece identifies these three types of workers as the “trusted unwitting insider,” the “trusted witting insider” and the “untrusted insider.” The first case is a person who, through some lapse in judgment, allows access to sensitive information (e.g., finding a thumb drive and plugging it into the company’s systems to see what it is), but certainly wouldn’t cause a problem purposely.

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access