insider threat

, , Comments Off on An Insider Threat Program to help tackle Internal Security Breaches

An Insider Threat Program to help tackle Internal Security Breaches

An Insider Threat Program to help tackle Internal Security Breaches

According to new research from IS Decisions, 2015 is set to see a huge rise in the number of IT Professionals taking action to address insider threat in their organization. Another day, another massive security breach of millions of consumer or company records. As the stories behind many of these breaches unravel, frequently the source appears … Continued

, , , Comments Off on The wealth of Personal Information accessed in Anthem Network Breach

The wealth of Personal Information accessed in Anthem Network Breach

The wealth of Personal Information accessed in Anthem Network Breach

Anthem, the second largest health insurer in the United States, are the latest high profile victim of a major data security breach. Compromised network credentials for up to 5 employees are thought to have been used to gain unauthorized network access to a corporate database, reportedly containing a wealth of personal information on current and … Continued

Comments Off on Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion that IT security is a combination of people, process and technology is nothing new. The triangle … Continued

, , , , Comments Off on Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center recently published its research on unintentional insider threats focusing on the use of phishing and/or … Continued

, , Comments Off on A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company. This finding explored in the report, ‘From Brutus to Snowden: a study of insider threat personas‘ highlights how employees in two of the world’s … Continued

, Comments Off on From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued

, , Comments Off on Research shows Employees see no Security Risk in Sharing Passwords

Research shows Employees see no Security Risk in Sharing Passwords

Research shows Employees see no Security Risk in Sharing Passwords

One of the biggest internal security issues every business has to deal with is password sharing. On Windows Active Directory networks the threat of shared passwords can be alleviated with UserLock. UserLock’s concurrent login controls and context-aware access restrictions mean IT teams can now control where and how each employee accesses the network. This level of security is not … Continued

, , , Comments Off on Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Last week IS Decisions participated in the SPIN Insider Threat Conference in London joining participants from academia, government and industry to discuss the threat from within. Speakers at the workshop included security experts from CERT, PA Consulting Group (HoMER Publication), Oxford e-Research Centre & the US Secret Service. In a series of 3 posts we … Continued

, Comments Off on More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

Since the release of UserLock 7 eleven months ago, UserLock has helped equip more organizations with the means to prevent, detect and respond to the risk of the insider threat. We are now delighted to announce the release of UserLock 8 Beta Version. Click here to participate in the Beta testing program!   Considering that there … Continued

Secured By miniOrange