Information contained on this page is provided by an independent third-party content provider. WorldNow and this Station make no warranties or representations in connection therewith. If you have any questions or comments about this page please contact email@example.com.
SOURCE 360 Advanced P.A.
TAMPA, Fla., June 10, 2014 /PRNewswire/ -- Chief information officers cannot underestimate the creativity of online organized criminals to quietly penetrate their IT systems through a growing area of vulnerability: employees and vendors. That's the conclusion of information security compliance specialists at 360 Advanced P.A. (www.360advanced.com).
"The media normally paints insider threats as one of your employees going rogue," said David James Smith, an information technology security consultant and Certified Ethical Hacker at 360 Advanced. "It has been my experience that a lot more is happening inside a company and inside a network that is just as dangerous. Your information, your data, may already be out there and you don't even know it."
With the growth of APTs (advanced persistent threats), Smith explains there is an expanding community of uber hackers who are intentionally going through small numbers of trusted but lax employees and vendors to get into information systems, and managing to stay there because they have such a small footprint. They work inside, often undetected for months, because they entered through so-called trusted routes.
Smith, a CompTIA Certified Advanced Security Practitioner who worked for the U.S. Department of Defense, offers the following advice:
©2012 PR Newswire. All Rights Reserved.