Tesla hit by ‘damaging sabotage’ by employee
Information Security Buzz
Cyberattackers typically steal employee credentials in order to enjoy the same freedom of movement while they spy, spread and steal. In this case, an employee became an insider threat. In the case of a cyberattacker or a rogue employee, enterprises benefit from internal monitoring that can detect suspicious behavior.