insider threat

, Comments Off on Stopping Legitimate Login Credentials being used for Security Breaches

Stopping Legitimate Login Credentials being used for Security Breaches

Stopping Legitimate Login Credentials being used for Security Breaches

Many data breaches involve the use of legitimate login credentials. Guarding against these ‘insider threats’ means better protecting all authenticated users access to the network, and the sensitive information within. The Threat from Human and Authenticated Users There is now widespread recognition that the insider threat is very serious but in most sectors there is insufficient … Continued

Comments Off on How an Insider Threat Assessment Can Help You Uncover Gaps in Protection

How an Insider Threat Assessment Can Help You Uncover Gaps in Protection

How an Insider Threat Assessment Can Help You Uncover Gaps in Protection

The following is a guest post from Greg Cullison, Senior Executive of Security, Stability & Insider Threat Programs at Big Sky Associates The issue of ‘Insider Threat’ may be one that has recently crossed your desk. If so, you are aware that insiders can cause harm in ways that are not as easy for outsiders … Continued

, Comments Off on How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior … Continued

, Comments Off on Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

The biggest threat for the banking sector is coming from within. How can a bank mitigate against the risk from malicious, careless or exploited users? This week saw U.S. law enforcement officials arrest five individuals who reportedly were involved in the high-profile 2014 security breach of JPMorgan. The breach was one of the largest attacks … Continued

, Comments Off on Better Understanding the Insider Threat

Better Understanding the Insider Threat

Better Understanding the Insider Threat

The fact is that many, if not most, security breaches involve internal users, and this risk is known as ‘Insider Threat’. Creating a culture of cybersecurity within and for your employees is paramount in helping to safeguard your company against insider threats. The theme of this year’s National Cyber Security Awareness Month (NCSAM) was ‘Our Shared … Continued

, Comments Off on Why creating a culture of security awareness is crucial in tackling insider threat

Why creating a culture of security awareness is crucial in tackling insider threat

Why creating a culture of security awareness is crucial in tackling insider threat

Last month was European Cyber Security Month (ECSM), and this year’s theme was ‘Cyber Security is a Shared Responsibility’, reflecting the notion that cyberspace cannot be secured without the help of all users. Meanwhile, Week 2’s topic ‘Creating a culture of cyber security at work’ related closely to what is most organizations’ weakest link – its … Continued

Comments Off on MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat

Released today, MeriTalk’s Inside Job. The Federal Insider Threat Report surveyed 150 Federal IT managers on insider threat. The new report examines actions agencies should take to minimize risk and cyber incident consequences. The consequences are real. In the past year, nearly half of Federal agencies were targets of insider threats and nearly one in three (29 percent) … Continued

Comments Off on Insider Threat Program. 12 Steps to Future Proofing your Internal Security

Insider Threat Program. 12 Steps to Future Proofing your Internal Security

Insider Threat Program. 12 Steps to Future Proofing your Internal Security

The Future of Addressing Insider Threat All data is from the IS Decisions’ research report User Security in 2015: The Future of Addressing Insider Threat, a study into the opinions and immediate plans of 500 IT decision makers in regard to tackling the insider threat. It could be argued that we’ve reached a kind of tipping point … Continued

, , Comments Off on Majority of IT Pros don’t trust Biometrics for Corporate Security

Majority of IT Pros don’t trust Biometrics for Corporate Security

Majority of IT Pros don’t trust Biometrics for Corporate Security

Only a quarter of IT professionals believe that biometrics is the safest way to confirm identity in order to access corporate data, according to new research from IS Decisions. In fact, no individual technology wins a majority. Biometrics (23%) comes one place behind two-factor authentication (29%), and edged only slightly ahead of the humble old … Continued

Comments Off on How Technology & Education help Mitigate the Insider Threat

How Technology & Education help Mitigate the Insider Threat

How Technology & Education help Mitigate the Insider Threat

IT professionals are looking to take a joined up approach of better user education and technology solutions to mitigate the insider threat. According to 500 IT Professionals, the continual high profile internal security breaches are prompting a surge in preventative measures against insider threat. 43% of organizations have now an insider threat program in place and … Continued

Secured By miniOrange