What is an Insider Threat, and what Isn’t

What is an Insider Threat, and what Isn’t

Of the many menacing forces that can do to harm to the running of a organization, the most dangerous, though conversely the least frequently discussed, is the insider threat. More than half of all cyber-attacks were carried out by people in trusted positions of the companies targeted. They were insiders. Yet there is still no proved method of entirely removing the threat of this group. This is partly due to their very nature. Insiders are people, not programs, and like all [...]

The 10 World's Biggest Insider Breaches Of All Time

The 10 World’s Biggest Insider Breaches Of All Time

Over the last 15 years, the frequency and number of data or insider breaches has increased immensely, with each new year beating the previous in the number of stolen records. As the number of exposed records continues to rise – over 6 million records exposed last year only in US – companies are allocating more and more resources in building a “cyber wall” to protect themselves from sophisticated attackers who want to get in. In reality, a much bigger threat [...]

How To Protect Your Business Against Insider Threats – The Essential Guide Part 2

In the first part of our essential guide we looked at the importance of using cross-departmental teams, and HR in particular, to combat insider threats, as well as the key role physical security can play in protecting business assets. Five More Essential Tips For Protecting Against Insider Threats Missed part one? You can read it here. Up-do-date? Let’s look at some more essential tips for ensuring insider security: 4. Consider Threats Across Your Entire Supply Chain An insider can be anyone who has access [...]

7 Facts That Show Why PAM is the Next Hot Technology to Prevent Insider Threats

7 Facts That Show Why PAM is the Next Hot Technology to Prevent Insider Threats

When people think of issues relating to compromised information or a data leak, the image that usually comes to mind is that of the mysterious hacker that could be anywhere in the world. While this is an important concern to maintain, this focus tends to be at the cost of considering the threat that could be right under your nose. In this article, we are going to talk about the threat of an insider attack. Security failures that come from [...]

How To Protect Your Business Against Insider Threats – The Essential Guide Part 1

Businesses are increasingly waking up to the insider threats that pose significantly risk to data and business security. A recent survey of security professionals conducted by Intel and McAfee found that internal individuals were responsible for 43% of all serious data breaches experienced by their businesses. Of these, just over half (22% of the total) were caused by intentional, malicious actors; the rest (21% of the total) were caused unintentionally. 68% of these breaches were serious enough to have a negative [...]

12 Surprising Facts You Didn’t Know About Insider Threats

12 Surprising Facts You Didn’t Know About Insider Threats

In the modern digital age, information security is a larger concern than it has ever been before. Sensitive information can be stolen in huge quantities, and the perpetrator never even needs to enter the property. This leads many businesses to primarily focus on the threats that exist from outside actors, but this is at the expense of paying adequate attention to the threats that may exist from insiders (Insider Threats). You want to trust your employees, and you have probably [...]

17 Amazing Blogs on Insider Threats You Should Be Following

17 Amazing Blogs on Insider Threats You Should Be Following

After a string of concerning news about some of the world’s biggest brands falling victim to cyber attacks (Insider Threats?), it’s only natural to devote a great majority of your security budget to defending your business from outsider threats. After all, if hackers can penetrate the gates of companies like Sony Pictures, Target, or the University of Calgary, then it should be evident that you must focus on hardening your security from the outside-in, right? Wrong. While cyber attacks are a [...]

Strategies for a CISO to Prevent Insider Threats

Strategies for a CISO to Prevent Insider Threats

Insider threats are on the rise, and it's still a large security flaw in most systems. It's especially common in small businesses that grow to medium-sized enterprises where old employees are trusted and permissions across the network are globally loose. As a CISO, your responsibility is to rein in these security flaws and protect the enterprise from data loss and theft. Before you think your organization is safe, studies show that insider threats are bad and getting worse. Many [...]

How the CTO Uses Data to Fight Against Inside Attackers?

How the CTO Uses Data to Fight Against Inside Attackers?

In the InfoSec industry, CTOs have witnessed many inside jobs also known as insider threats. These threats usually comprise of individuals or groups of people in organizations or companies. These individuals may include employees, contractors, business associates or partners. They try to deliberately contribute to or begin to breach the network of the company to sabotage or steal information. Because these people are already inside the company, they have the advantage of being familiar with how the network works [...]

Stopping Insider Threats Easily with PAM

Stopping Insider Threats Easily with PAM

This past year has seen an increase in the number of insider threats that cause critical data leakage for large corporations. A recent Intel study showed that insider threats accounted for 43% of data breaches. Many security professionals monitor perimeter firewalls and beef up security where they are considered weak. However, what they often tend to miss are the insider threats that are increasingly problematic in today’s organization.   But You Need to Trust Your Employees, Right? Small businesses run into a [...]