Many data breaches involve the use of legitimate login credentials. Guarding against these ‘insider threats’ means better protecting all authenticated users access to the network, and the sensitive information within. The Threat from Human and Authenticated Users There is now widespread recognition that the insider threat is very serious but in most sectors there is insufficient … Continued
How an Insider Threat Assessment Can Help You Uncover Gaps in Protection
The following is a guest post from Greg Cullison, Senior Executive of Security, Stability & Insider Threat Programs at Big Sky Associates The issue of ‘Insider Threat’ may be one that has recently crossed your desk. If so, you are aware that insiders can cause harm in ways that are not as easy for outsiders … Continued
How to reduce the risk of Insider Threat in Healthcare
Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior … Continued
Information Security in Banking and the Insider Threat
The biggest threat for the banking sector is coming from within. How can a bank mitigate against the risk from malicious, careless or exploited users? This week saw U.S. law enforcement officials arrest five individuals who reportedly were involved in the high-profile 2014 security breach of JPMorgan. The breach was one of the largest attacks … Continued
Better Understanding the Insider Threat
The fact is that many, if not most, security breaches involve internal users, and this risk is known as ‘Insider Threat’. Creating a culture of cybersecurity within and for your employees is paramount in helping to safeguard your company against insider threats. The theme of this year’s National Cyber Security Awareness Month (NCSAM) was ‘Our Shared … Continued
Why creating a culture of security awareness is crucial in tackling insider threat
Last month was European Cyber Security Month (ECSM), and this year’s theme was ‘Cyber Security is a Shared Responsibility’, reflecting the notion that cyberspace cannot be secured without the help of all users. Meanwhile, Week 2’s topic ‘Creating a culture of cyber security at work’ related closely to what is most organizations’ weakest link – its … Continued
MeriTalk Insider Job. Actions to Minimize the Risk of Insider Threat
Released today, MeriTalk’s Inside Job. The Federal Insider Threat Report surveyed 150 Federal IT managers on insider threat. The new report examines actions agencies should take to minimize risk and cyber incident consequences. The consequences are real. In the past year, nearly half of Federal agencies were targets of insider threats and nearly one in three (29 percent) … Continued
Insider Threat Program. 12 Steps to Future Proofing your Internal Security
The Future of Addressing Insider Threat All data is from the IS Decisions’ research report User Security in 2015: The Future of Addressing Insider Threat, a study into the opinions and immediate plans of 500 IT decision makers in regard to tackling the insider threat. It could be argued that we’ve reached a kind of tipping point … Continued
Majority of IT Pros don’t trust Biometrics for Corporate Security
Only a quarter of IT professionals believe that biometrics is the safest way to confirm identity in order to access corporate data, according to new research from IS Decisions. In fact, no individual technology wins a majority. Biometrics (23%) comes one place behind two-factor authentication (29%), and edged only slightly ahead of the humble old … Continued
How Technology & Education help Mitigate the Insider Threat
IT professionals are looking to take a joined up approach of better user education and technology solutions to mitigate the insider threat. According to 500 IT Professionals, the continual high profile internal security breaches are prompting a surge in preventative measures against insider threat. 43% of organizations have now an insider threat program in place and … Continued