by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : May 2014
Your cubemate is probably the intent to take valuable information off the premises for her own use. Or maybe she important: information online or to others. Some employees or contractors are on a employees are up to. T F I T G m C g GAME CHANGING ECHNOLOG O MEE AGENC MI ION SPONSORED REPORT INSIDER THREATS 1 he percentage of total incidents attributable to insider threats Source: Verizon's 2013 Data Breach Investigations Report 17 he percentage of insider threats caused by malware or spyware Source: CERT Insider Threat Team 28 he percentage of insider threats carried out via portable equipment Source: CERT Insider Threat Team 9 he percentage of unintentional insider threats caused by accidental disclosure of personal information via the Internet, mishandled or sent to the wrong party Source: CERT Insider Threat Team 87 he average number of days for an organization to discover a case of insider fraud Source: Ponemon Institute "2013 Risk of Insider Fraud" 188 he cost, in dollars, of one lost or stolen records Source: Ponemon Institute "2013 Risk of Insider Fraud" 1.5 million he average amount of damage caused, in dollars, by managers found guilty of insider fraud Source: Ponemon Institute "2013 Risk of Insider Fraud" INSIDER THREATS BY THE NUMBERS