A computer technician can make the following changes to fulfill the orders to secure office data and prevent unauthorized access in the case of insider theft:
- Implement strong password policies and enforce them consistently across all devices and systems.
- Enable multi-factor authentication (MFA) for all user accounts.
This includes requiring complex passwords, regular password changes, and avoiding the use of easily guessable passwords or personal information.
So, MFA adds an extra layer of security by requiring additional verification steps beyond just a password, such as a code sent to the user's mobile phone or a fingerprint scan.
See text below
You work as a security administrator of a large department store chain or choose another large corporation of your choosing. You believe that there has been a breach in the VPN where an employee has stolen data using a personal laptop along with using the company assignment computer. You review the logs from the IDS, remote access systems, and, file servers and confirm this belief. Your employer wishes to gain access to the personal laptop used for the breach to determine the full extent of the data stolen. The guilty employee’s lawyer claims that the laptop is not identifiable.
Create a formal document to the CEO of the company to account for your findings, tools used to solve the breach and what steps will be taken to prevent this type of breach from happening again. You will also need to create a press release to the Public regarding this breach. Create a disaster recovery plan for the employees and vendors in case of a breach.
Things to consider: What would best be used to identify the specific laptop used for the theft? How would you acquire the identifying information? List some items that would NOT be useful to identify the specific computer used by the insider.