• Latest
  • Trending
Cybersecurity in 2022: Addressing Insider Threats

Cybersecurity in 2022: Addressing Insider Threats

January 11, 2022
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Wednesday, 27 September, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Cybersecurity in 2022: Addressing Insider Threats

by ITECHNEWS
January 11, 2022
in Leading Stories, Opinion
0 0
0
Cybersecurity in 2022: Addressing Insider Threats

As companies grapple with pandemic-induced economic uncertainty, operational disruption and business transformation, cybersecurity has increasingly coalesced with these priorities. Several high-profile cybersecurity incidents drove news cycles in 2021, prompting leaders to reassess their defensive postures. 

As a result, Gartner’s 2021 CIO Agenda Survey found that more than half of C-suite executives view cybersecurity as the top priority moving forward. It’s easy to see why: The latest industry report concluded that the average data breach surpassed $4 million in recovery costs, an all-time high. Meanwhile, increasingly stringent regulatory standards and hardened consumer sentiment has prompted businesses to reconsider their cybersecurity readiness. This past October, businesses had an opportunity to double down on that priority as Cybersecurity Awareness Month reminded leaders to #BeCyberSmart. 

YOU MAY ALSO LIKE

ATC Ghana supports Girls-In-ICT Program

Vice President Dr. Bawumia inaugurates ICT Hub

While businesses work to defend their data and IT infrastructure from an increasingly expansive threat landscape, CIOs and other decision-makers will need to answer critical questions about how to deploy their limited cybersecurity resources. In many cases, they can expect the most robust return-on-investment by defending against insider threats—the employees, contractors and other privileged users with access to critical company data. With the “human element” accounting for 85% of cybersecurity incidents, insider threat detection and prevention is a proven way to improve data privacy and cybersecurity standards moving forward. 

Here are three ways companies can begin that process today. 

Understand Insider Threats 

Insider threats are frequently overlooked. After all, a company’s employees are often empowered as trusted members of the organization, tasked with improving growth, supporting outcomes and sustaining customer relationships. However, some insiders will capitalize on that trust, using their privileged access to steal customer data, company secrets or other valuable digital assets.

These malicious actors are often motivated by money. With a ready market of dark web consumers, it’s relatively easy for employees to turn network access into financial gain. Of course, some insider threat actors are driven by other motives, including leveraging insider access for professional gain, personal vendettas or even unabashed amusement. 

While most employees will not become malicious insiders, some will, and companies can enhance their cybersecurity readiness by acknowledging the threat and developing response protocols to prevent company insiders from undermining cybersecurity and data privacy. 

Teach Cybersecurity Best Practices 

Companies need to guard against malicious insider threats, but they also need to equip their employees with cybersecurity best practices. Accidental insiders, employees who undermine cybersecurity due to their ignorance or by accident, are endemic at many companies. With employees managing everything from new hybrid work models to historic numbers of phishing scams, there is a desperate need to teach and train employees to keep data secure. 

For example, a survey of employees’ cybersecurity readiness found that 61% of participants failed a cybersecurity fundamentals quiz. Meanwhile, companies spend just 5% of their IT budgets on employee training. 

Specifically, employee training can include: 

  • phishing scam awareness 
  • data management best practices and expectations 
  • personal device restrictions 
  • digital hygiene fundamentals. 

When coupled with accountability measures, employee training empowers everyone to #BeCyberSmart in any environment.

Take Action 

Whether an employee intentionally steals company information or accidentally compromises data privacy, the outcomes are the same. Businesses face escalating recovery costs, intense regulatory scrutiny and often irreparable brand erosion. That’s why companies need to take action to guard against insider threats. 

Employee monitoring software powered by AI behavior analytics can help IT leaders identify risks before they erupt, preventing cybersecurity incidents before they occur. In addition, highly capable software solutions can separate casual alerts from high-risk behaviors, empowering cybersecurity personnel to take action without inundating them with action items. 

This is especially important as many cybersecurity teams experience burnout after yet another challenging year. Tragically, one survey found that 70% of respondents say their work managing IT threat alerts emotionally impacts their home lives. Similarly, more than half report that their teams are overwhelmed by the number of alerts reaching their desktops. 

By deploying highly capable employee monitoring and insider threat prevention software, companies can reduce the strain on their IT teams while continuing to guard against this significant cybersecurity concern. 

Cybersecurity Awareness Month: Why Wait?

After a challenging and disruptive year, many business leaders better understand the centrality of cybersecurity to their day-to-day operations and long-term sustainability. This year—you don’t have to wait for October—is an opportunity to evaluate cybersecurity readiness, ensuring that the right people, processes and resources are available to meet the moment. When doing so, consider the impact of insider threats, and don’t let this often-overlooked threat category go unaccounted for in the year ahead.

 

Source: Isaac Kohen
Via: Security Boulevard
Tags: cybersecurity
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version