What is an Insider Threat, and what Isn’t

What is an Insider Threat, and what Isn’t

Of the many menacing forces that can do to harm to the running of a organization, the most dangerous, though conversely the least frequently discussed, is the insider threat. More than half of all cyber-attacks were carried out by people in trusted positions of the companies targeted. They were insiders. Yet there is still no proved method of entirely removing the threat of this group. This is partly due to their very nature. Insiders are people, not programs, and like all [...]

The 10 World's Biggest Insider Breaches Of All Time

The 10 World’s Biggest Insider Breaches Of All Time

Over the last 15 years, the frequency and number of data or insider breaches has increased immensely, with each new year beating the previous in the number of stolen records. As the number of exposed records continues to rise – over 6 million records exposed last year only in US – companies are allocating more and more resources in building a “cyber wall” to protect themselves from sophisticated attackers who want to get in. In reality, a much bigger threat [...]

How To Protect Your Business Against Insider Threats – The Essential Guide Part 2

In the first part of our essential guide we looked at the importance of using cross-departmental teams, and HR in particular, to combat insider threats, as well as the key role physical security can play in protecting business assets. Five More Essential Tips For Protecting Against Insider Threats Missed part one? You can read it here. Up-do-date? Let’s look at some more essential tips for ensuring insider security: 4. Consider Threats Across Your Entire Supply Chain An insider can be anyone who has access [...]

7 Facts That Show Why PAM is the Next Hot Technology to Prevent Insider Threats

7 Facts That Show Why PAM is the Next Hot Technology to Prevent Insider Threats

When people think of issues relating to compromised information or a data leak, the image that usually comes to mind is that of the mysterious hacker that could be anywhere in the world. While this is an important concern to maintain, this focus tends to be at the cost of considering the threat that could be right under your nose. In this article, we are going to talk about the threat of an insider attack. Security failures that come from [...]

How To Protect Your Business Against Insider Threats – The Essential Guide Part 1

Businesses are increasingly waking up to the insider threats that pose significantly risk to data and business security. A recent survey of security professionals conducted by Intel and McAfee found that internal individuals were responsible for 43% of all serious data breaches experienced by their businesses. Of these, just over half (22% of the total) were caused by intentional, malicious actors; the rest (21% of the total) were caused unintentionally. 68% of these breaches were serious enough to have a negative [...]

12 Surprising Facts You Didn’t Know About Insider Threats

12 Surprising Facts You Didn’t Know About Insider Threats

In the modern digital age, information security is a larger concern than it has ever been before. Sensitive information can be stolen in huge quantities, and the perpetrator never even needs to enter the property. This leads many businesses to primarily focus on the threats that exist from outside actors, but this is at the expense of paying adequate attention to the threats that may exist from insiders (Insider Threats). You want to trust your employees, and you have probably [...]

17 Amazing Blogs on Insider Threats You Should Be Following

17 Amazing Blogs on Insider Threats You Should Be Following

After a string of concerning news about some of the world’s biggest brands falling victim to cyber attacks (Insider Threats?), it’s only natural to devote a great majority of your security budget to defending your business from outsider threats. After all, if hackers can penetrate the gates of companies like Sony Pictures, Target, or the University of Calgary, then it should be evident that you must focus on hardening your security from the outside-in, right? Wrong. While cyber attacks are a [...]

Strategies for a CISO to Prevent Insider Threats

Strategies for a CISO to Prevent Insider Threats

Insider threats are on the rise, and it's still a large security flaw in most systems. It's especially common in small businesses that grow to medium-sized enterprises where old employees are trusted and permissions across the network are globally loose. As a CISO, your responsibility is to rein in these security flaws and protect the enterprise from data loss and theft. Before you think your organization is safe, studies show that insider threats are bad and getting worse. Many [...]

Insider Threats and Their Importance

Insider Threats and Their Importance

Firms around the globe are now confirming that insider threats are a growing occurrence. While this comes as a surprise to few, the lack of focus on this issue seems to be shared by more IT professionals than expected. As enterprise level change is initiated, it is common for firms to evaluate threats first from external sources first, then from within. While the importance in order of security deployment is negotiable, the most dangerous sort of attack may already [...]