From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security.

From Brutus to Snowden: A study of Insider Threat Personas

insider threat personas

Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves.

Learn who the most potentially dangerous users are in your organization and industry, and what you can do to alter behavior and mitigate the risk.

  • Who is most likely to be sharing passwords and why?
  • Why the majority of desk-based employees see no security risk in sharing work login.
  • What the reality of internal security breaches looks like and how many ex employees continue to access work systems post termination.
  • Why are industries (Legal, HR, Healthcare etc) that are thought to be regulated are actually more likely to be sharing passwords?
  • How aware different users are of security issues.
  • Follow Five Security Steps to alter user behavior

The report also builds up a picture of some of the differing security personas you are likely to find in your business:

Careless Jennifer, Partner Paula, Hypocritical Nooreen, Confused Kevin, Diligent Roger and Ex-employee Mark.

Download the Study for Free here 

More about the report:

Based on independent research conducted with 1,000 desk workers in the US and 1,000 more in the UK, the study delves into how perceptions, attitudes and behavior with regards to security in the workplace differ across demographics, job roles and industries.

Share this post :

Chris is Community Manager of IS Decisions. IS Decisions software offers organizations proven and effective solutions to help protect a Windows Network against Insider Threats.

Secured By miniOrange