IT pros know all too well the difficulties of dealing with a world of deception not only caused by cyber criminals but also privileged insiders.
Conclusion
Clearly you can see from these six cyber secrets that the internal and external risks are significant to an organization's IT security posture – and they're mounting. What's worse, betrayal – in the form of a data breach, for example – can include ruined reputations, revenue and customer loss, damaged intellectual property, litigation and the list goes on.
Communication is the key as it is in any healthy relationship. IT and security pros must clearly communicate these risks outside of the IT department in a way that resonates with upper management and achieves top-down buy-in for proper defenses against advanced threats — especially as data moves into the cloud and across other devices.