
Sign up to save your podcasts
Or


This episode talk about business authorization and use of access within a business. Just because your employees have access to do their job, that does not necessarily mean they can use that access whenever they want. There is a distinction between authorized use and abuse of use.
You can have a breach with someone that has legitimate access but abuses it. Listen to hear how this happens.
Be aware, be safe.
------------------------------------
Website - https://www.binaryblogger.com
Twitter - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
Podcast RSS - http://securityinfive.libsyn.com/rss
YouTube - https://www.youtube.com/binaryblogger
TuneIn Radio - Security In Five Channel
Email - [email protected]
By Drew KoenigThis episode talk about business authorization and use of access within a business. Just because your employees have access to do their job, that does not necessarily mean they can use that access whenever they want. There is a distinction between authorized use and abuse of use.
You can have a breach with someone that has legitimate access but abuses it. Listen to hear how this happens.
Be aware, be safe.
------------------------------------
Website - https://www.binaryblogger.com
Twitter - https://www.twitter.com/binaryblogger
iTunes - https://itunes.apple.com/us/podcast/security-in-five-podcast/id1247135894?mt=2
Podcast RSS - http://securityinfive.libsyn.com/rss
YouTube - https://www.youtube.com/binaryblogger
TuneIn Radio - Security In Five Channel
Email - [email protected]