9.5 Summary

Many security professionals refer to people as the "weakest link" in the computer security chain. The chain is weaker still when your employees and users actively work to subvert your security from the inside. In today's world, trusted individuals are increasingly empowered to do great damage. The only way to protect yourself and your organization is to implement policies and procedures designed to weed out obvious bad actors and then carefully shepherd those who remain.

    Part VI: Appendixes