Effective insider threat defense begins with candidate vetting. Background checks and reference calls can confirm elements of an applicant’s history, but they rarely surface the deeper risks that can turn into costly problems down the line. Identity verification, credential validation, and digital risk assessments need to be layered into the hiring process. Indicators such as reused or doctored photos, a minimal online presence, or newly created social media accounts can signal that a candidate may … More
The post Identifying risky candidates: Practical steps for security leaders appeared first on Help Net Security.
This article has been indexed from Help Net Security
Read the original article: