Language: EN | FR | 中文版

The Insider Threat Security Manifesto Beating the threat from within

Insider Threat Manifesto

Ask any IT professional to name the security threats to their organisation and they will probably reel off a list of external sources; hackers, viruses, denial of service attacks and phishing.

However, more often than not the greatest risk to any organisation comes from within. That unhappy employee, or rogue insider who will go to any length to gain access to the organisation's crown jewels, share the sensitive data they get their hands on and even put it to some other unscrupulous use such as insider trading.

We've conducted a piece of research with 500 IT decision makers in the UK and US to better understand their attitudes to insider threat, as well as how well set up they are to manage it.

Read more  ›››

Read more about

  • Where insider threats come in IT professionals' list of security priorities
  • How prolific password sharing and internal security breaches are in US and UK businesses
  • How some industry regulatory bodies seek to minimise insider threat, and how compliant businesses are with their own industry regulations
  • What you can do to mitigate the risks from both a technological and cultural standpoint in your organisation