Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

How Internal Threats Occur

Employee Sabotage & Theft

Employee Sabotage & Theft

  • Employees may steal or damage computer equipment and data.

  • There may also be fires, floods, power loss & even terrorism.

  • Some of these may be directly caused by employees on purpose.

Unauthorised Access by Employees

Unauthorised Access by Employees

  • Employees may gain access to areas of the system they shouldn't & use this to steal data.

  • They may even obtain administrator access and use it to perform functions to hinder security in the system.

  • This can then be used to launch further attacks, potentially from external sources.

Weak Cyber Security Measures & Unsafe Practices

Weak Cyber Security Measures & Unsafe Practices

  • Companies who don't implement digital & physical security methods & practices are vulnerable to threats.

  • Leaving rooms unlocked or computers logged in would allow a visitor to access secure areas.

  • Employees may accidentally cause harm, such as visiting a dodgy website and downloading a virus, if not aware of safe practices.

Accidental Loss or Disclosure of Data

Accidental Loss or Disclosure of Data

  • Not all damage is malicious. Errors by employees can lead to serious harm.

  • A laptop left on a bus, or a virus accidentally downloaded, could lead to confidential data being damaged or exposed.

  • Hardware could also be damaged by accidents, such as a spilled drink, which would cause a loss of data.
Learn more about creating dynamic, engaging presentations with Prezi