4.3) OUTSIDE PARTNERS & SUPPLIERS
Suppliers and clients may also gain accessto a company’s information technology and use it to commit crimes, especially since intranets and extranets have become more commonplace. Partners and vendors also may be the inadvertent source of hacker mischief because their systems may not be as well protected as the larger partner’s networks and computers, and so a third party may penetrate their security.
4.4) CORPORATE SPIES
Competing companies or individuals may break into a company’s computer system to conduct industrial espionage—obtain trade secrets that they can use for competitive advantages.