That is, people inside the company who are attacking the systems??? (Ilett, 2006).US Federal Trade Commission???Disgruntled employees gaining access to customer lists and other information is proving a growing danger.???Commonly used countermeasuresThere are only a few countermeasures that corporations can adopt to prevent unauthorized portable deviceuse.