Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 14

Kelly Crooks

Marcena, insider threats have always been a concern of mine as well. I think they have always been a concern because, as you said, individuals such as employees or contractors have access to the origination data. They have the authority to access sensitive data and information. There are too many variables that can play a role in the loss or theft of that data by those individuals. I think about what happened last month with the young man in the military stealing, copying, and sharing sensitive military data from the Pentagon. Even with all of the security protocols, procedures, policies, and background checks he was still able to leak that information. I often think that someone there wasn’t doing their job correctly.


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .