Reply to post: Re: Why infiltrate -- Exception Requests

Tech giants! How do you know Jim in accounting isn't Putin moves on you

GnuTzu Silver badge

Re: Why infiltrate -- Exception Requests

Either way, it still counts as a malicious insider threat (as opposed to the non-malicious kind). Anyone who approves any manner of security exception has to be wary of every email, particularly requests for exceptions.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019