Firewalls are an important key to protecting your network, but what about protection your network from your own users?
2. Security Breach – how users could give hackers access to your network
3. Determining your risk
4. Minimizing risk and protecting the organization from your own users
5. Summary and Recommendations