Article by Felix Nater, President, Nater Associates, Ltd.
Security Management Consultant
 

Recipient of the 2005 Long Island Works Coalitions Workforce Builder's Leadership Award: Small Business Category

"A small business that applies common sense and flexibility to achieve the best value."


Workplace Violence includes a new, emerging threat that causes concerned managers considerable angst, so say a variety of current surveys and research...
 

While traditional company approaches suggest that the problem typically deals with the hostile behavior of a disgruntled employee or the escalation of disputes between employees, security directors also include the risk posed by the armed robber and the opportunity criminals.
 
That was the traditional perspective.  Not factored into the traditional equation is the calculated threat posed by the "Insider" who has privileged access to the company Intranet, company files, remote access and management,  and oversight via his or her computer. The advent of remote access has further muddied the waters.

New, non-traditional approaches to the Prevention of Workplace Violence and Workplace Security do not disqualify any potential threat to the safety and security of the workplace, hence the discovery of new more potent threats. These new approaches require an analytical perspective that looks beyond the walls and into the world of minimized detection and maximum damage.

No longer should responsible officials limit their scope to preventing escalation of violence between employees.  New, harder-to-detect methods have arisen for employees to exact revenge or "make a point".

One new retaliatory measure at employees' disposal involves network "privileged access".  Devastating damage can be inflicted using such access.  While we await the other "Threats from Within - the Terrorist" to strike, the new "lying in wait" culprit is the "privileged user" who might be a current employee, former employee, vendor or contractor with access...who has an ax to grind or score to settle.

What makes this perpetrator extremely dangerous and drastically effective is access.  The physical access controls that deny unauthorized intruders do not deny the privileged user access.

"For many years external security threats received more attention than internal security threats, but the focus has changed.  While viruses, worms, Trojans and DoS are serious, attacks perpetrated by people with trusted insider status - employee, ex-employees, contractors and business partners-pose a far greater threat to organizations in terms of potential cost per occurrence and total potential cost than attacks mounted from the outside".  ("The Enemy Inside", Kristin Gallina Lovejoy, CSO, April 2006).


Following this thought process, one quickly surmises the magnitude and capability of this perpetrator's reach. Gone are days of risking exposure; this perpetrator chooses to wait for the opportunity, lay a trap, sabotage systems, disrupt operations and even transfer company files to competitors.  "Getting even" takes on new dimensions.

And so,  now we have a new, broader profile and threat to contend with.  The traditional "going postal" profile: Males, 17-60 years of age, holds a technical position, being married... does not matter any more. 

The new profile is racially and ethnically diverse and can come from a broad pool of employees.  These are the new suspects. Common amongst perpetrators, though, is the perception of victimization and revenge and the facility of  theft of information, conflicting interest, abuse of privileges and disgruntled behavior.  Whereas the act of violence is physical in orientation, the Internet or Computer Predator chooses this medium of retaliation that is cleaner and has a faceless victim.

Case Study:

An employee of a major government agency, feeling victimized by coworkers and sensing no intervention by management, resorts to acts of retaliation and revenge.

Initially he adapts to the common threats of physical harm, which include use of his vehicle, and verbal threats through the escalatory phases, which included death threats. Fortunately, he did not ever get the chance to deliver on his believed threat. While searching the internet for bomb making materials, his unsuspecting supervisor happened on his computer terminal accidentally, as he returned from an early lunch. He found the employee browsing at what appeared to be a bomb-making website. 

Sensing a serious breach of user privileges, superiors were notified and the computer was isolated and confiscated. An examination of the hard drive revealed an interesting forensic footprint. 

Upon investigation, it was disclosed that the employee was on the last phase of his bomb-making venture, having left the purchase of the last ingredients as the last step.

The employee admitted to his actions but denied his intentions. Because his intent was not clearly established, no criminal charges were lodged.  Suffice it to say, anyone can see the potential for, and potency of the power of abuse, for a  computer with its built-in tools.

Why does this new approach matter?  It matters because the workplace is the most exposed target for any predator with a revenge motivation, a terrorist bent or driven by greed and manipulation.  Countermeasures call for a return to astute vigilance and new policies.

What can you implement immediately?  Change passwords for ex-and former employees. Lock out contractors, vendors and business partners at the conclusion of official business dealings, and establish clear policies, guidelines and procedures - with consequences for breaches and criminal violations. 

To efficiently evaluate all visible and camouflaged areas of risk, create experience-based policy development by consultation with a qualified security consultant. 

When the policies have been set, secure the mindset and daily habits of managers and employees with follow-up implementation and education by the security consultant.

Not every company is fated to become a victim statistic in a publicized study or survey.  Use a broad, new approach.  In addition  to securing against Workplace Violence using traditional methods, protect against the new, emerging threats that cause concerned managers considerable angst, engage a Security Consultant when necessary, and protect the health of employees and your business. 


Article by Felix P. Nater

Posted with permission of Author.
Excerpted by webmaster,
greatwebsitesnow.com


"I help company executives stop worrying about the threat of workplace violence and workplace security." - Felix P. Nater, President,  Nater Associates, Ltd.


Please click on this link http://www.naterassociates.com/media/video/nater.html to launch my video. Please pass me along to others who may benefit from my services.

Contact Information:

Felix P. Nater, President
Nater Associates, Ltd.
Security Management Consultants
116-03 Parkway Drive
Elmont, New York 11003
Office: 1877-VALU101 or 516-285-8484
Fax: 516-285-0880
Email: nater@naterassociates.com
Website: www.naterassociates.com


To sign up for Mr. Nater's Security Etips free newsletter click on this link:
http://www.mailermailer.com/x?oid=11730h.  Visit my website: www.naterassociates.com.

©Copyright 2001 - 2018, GreatWebsitesNow.com   All Rights Reserved.
Patronize our New Clients: Best FIOS Cabling Installer for NYC Apartments | Connect to Work At Home during COVID-19 Distancing | Restaurant Near Cemetery Nassau-Suffolk   |  Gifts & Home Decor | Equipment Rental Long Island NY  | Snius Womens Teens Clothing | Ballroom Dance Lessons NYC |  Tree Removal Long Island  |  Web Developer Baldwin NY  |  Aspergers Services NYC  |  Wedding Dance Lessons NYC  |  Chiropractor Bellmore NY  |  Chiropractor for Dancers Injuries NYC
  |  Plumber Hicksville NY  Wedding Officiants NYC   | Non Denominational Wedding Officiants Long Island NY |  Best Interior Design Firm for NYC, Hamptons and Long Island |  Spectrum Cable Wiring for NYC Apartments




Home | Dance Manhattan Home Events - Dance Manhattan Wedding Dance About Dance Manhattan Dance Manhattan Pricing Getting Started Gift Certificates Busines Websites News Long Island BNI Invitation BNI Contact BNI Thank You Redirect LAYOUT - READY_2_ORGANIZE Services | About | Organizer NY Home Organizing Services NY Hamptons Camie Swinson Organizer NY Organizer NY Applause Relocations NYC Hamptons Home Parties Organizing Closets NY FAQ | Contact | Hosting | Feedback | Samples | Article Nater Associates | Sample Design Knucklehead Racing | Home | About Us | Contact Us | Article Joyce L Zimmerman | Shipping Offer David Padilla Hustle & Salsa Links | Childrens Vitamin Research Childrens Vitamins Privacy Statement Childrens Vitamins Research for Autism Soy Free Wheat Free Childrens Vitamins Spectrum Formula Home Fiber for Children ARTICLE Business Websites Melville Long Island NY Business Websites Huntington NY Long Island Website Support | Business Websites Long Island - FEEDBACK THANK YOU Calendar for nutraCeuticals Consulting nutraMetrix Home BNI Websites SEO Newsletter 2014 Web News Landing Pages Baldwin NY Website Developer Web Developer Garden City NY Probiotics Article Oceanside Chorale HOME Oceanside Chorale Director Oceanside Chorale Contact OC Awards OC Videos 4th Table Only RENTAL SPACE 4TH FLOOR 5TH FLOOR RENTAL DM RENTAL HOME DM Wedding HOME Wedding Dance Lessons NYC DM Wedding Dance Lessons - REVIEWS DM Wedding Contact Us DM Wedding NEWS Foodservice Home Rehearsal Music Map - OC Concert Mobile Home Page DM Wedding Officiants for NYC Our Director Fiber and Copper Cabling for CC TV, Intercoms and Phone-Data NYC Metro 5 Boros Area Best Wedding Officiants NY - Reviews and Testimonials New York Interior Design Services Including Long Island FIOS NYC Apartment Cabling Upgrades & New Installation--5 Boros Area PERM Advertising Set up Home Cable Network to Tele Commute to Work