An article in The Wall Street Journal today begins: "The biggest threats to information security often don\u2019t come from hackers.\u00a0 They come from a company\u2019s own employees."The Journal raises a valid point, and though it\u2019s easy to picture some bandit behind a mask and a keyboard when imagining information security threats, in today\u2019s fast paced, fraud-invested world that\u2019s simply not the case.Insiders pose the biggest threat because, unlike some hacker off in the Czech Republic, you\u2019ve already bestowed upon them a powerful tool, one that is prone to exploitation: Trust.As Scott Charney, Microsoft\u2019s chief security strategist, told The Journal, "You\u2019ve given them the keys to the castle.\u00a0 The more important they are to the organization, the more access they have."The article suggests eight precautions to take to protect your company from the enemy within.\u00a0 They are as follows:1) Know Your Risks.\u00a0 Examine and understand exactly where and how your company may be vulnerable to the misdeeds or mistakes of its employees.2)\u00a0 Know Your Insiders.\u00a0 Perform background checks before you hire potential candidates.3) Teach Security.\u00a0 Most insider-related security issues are unintentional.\u00a0 Educate employees to avoid these mistakes.4) Classify Your Data.\u00a0 There is a reason why the U.S. government uses Confidential, Secret and Top Secret classifications.\u00a0 The key is making it simple for employees to comprehend and use the classification system.5) Limit Access.\u00a0 After a comprehensive classification system is developed, companies need to set access controls so the good guys get and in and the bad folks don\u2019t.6) Use Encryption (Wisely).\u00a0 Scrambling your data so that it can\u2019t be read even if someone illegally accesses it is never a bad idea. You\u2019d be wise to encrypt any and all sensitive data.7) Monitor, Filter, Block.\u00a0 There is software out there that monitors, filters or blocks e-mail from employees and other related computer activities.\u00a0 If the Big Brother overtones don\u2019t bother you, employing these types of software certainly doesn\u2019t hurt.8) Hold Employees Accountable.\u00a0 Employees need to know the rules regarding information security at your company, and it\u2019s equally important that they know and understand the repercussions of breaking-or even bending-any of those rules.The Dangers Within. For the complete Journal story, read Don\u2019t forget to keep checking in at our CSO Security Feed page for updated news coverage.