Insider threats: From McDonald’s Monopoly to today, how to address how little has changed

What have we learned this year? Insider threats haven’t changed much. Companies and people still focus on the bright, shiny new technologies or expected windfalls from major projects. Many ignore the governance, controls and processes needed to successfully implement them. This creates disengagement and lowers the ability of the organization to fight inside and outside threats.

One of the first uses of the nascent internet in the 1990s was to bring people together via email. Before Facebook, WhatsApp or texting, epic email and USENET threads were the main ways of communication. AOL users were infamous for hitting the “Reply All” button, quoting entire messages, and saying “me too.” With some of the older email clients like Pine, this led to very uncomfortable scrolling as you had to scroll past numerous levels of one-line or one-word responses before you got to the actual message, which was buried in a series of “>” quote symbols.

With the email quotas of college email systems in the 1990s, this meant that you would often fill your quota quickly and sometimes your friends got the dreaded delivery failure message because your mailbox was full. This was especially true during March Madness, when tournament brackets would swamp email before Yahoo! Sports and started their online ones.

1 2 Page 1
Page 1 of 2
What is security's role in digital transformation?