Uncovering the Enemy Within: Utilizing Incident Response, Forensics


Inappropriate sharing of protected health information. Sending intimidating e-mails. Browsing inappropriate Web sites. Downloading unauthorized Web content. Software, music, or video piracy. These are just a few examples of internal security breaches companies may face. According to the 2003....