• Latest
  • Trending
#HowTo: Prevent Insider Threats in Your Organization

#HowTo: Prevent Insider Threats in Your Organization

February 28, 2022
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Sunday, 5 February, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

#HowTo: Prevent Insider Threats in Your Organization

by ITECHNEWS
February 28, 2022
in Leading Stories, Opinion
0 0
0
#HowTo: Prevent Insider Threats in Your Organization

n recent years, insider threats haven’t been heavily discussed in cybersecurity because we’ve had lots of other, more pressing issues to worry about. For example, ransomware seems to dominate the concerns of CISOs and other leaders in organizations (and rightfully so, given its impact). Yet, the insider threat is still there, and given the new paradigm shift of remote work, it is time for leaders to revisit its impact.

 

YOU MAY ALSO LIKE

Inaugural AfCFTA Conference on Women and Youth in Trade

Instagram fined €405m over children’s data privacy

What is an Insider Threat?

 

First, it’s important to define what we mean by an insider. An insider is someone that works within an organization as an employee, contractor or vendor. This person is typically trusted to carry out their daily duties and may have access to sensitive information or systems due to the privileges that they have been assigned. Keep in mind an insider could be anyone that works in the organization. This ranges from your office’s janitor or cleaning staff up to the CEO. Defining the threat an insider may pose relates to how they may use their access or information to create a type of attack. It is also important to understand that not all insider threats are malicious. Some insider attacks are unintentional, meaning mistakes or carelessness can be a threat. For example, if a sysadmin sends out a security update to the entire organization that causes everyone’s PCs to crash.

 

What Types of Attacks Can an Insider Threat Cause?

 

The list of potential attacks caused by an insider is extensive and challenging for an organization to understand. However, here are three of the most common types that can cause significant damage:

  • Theft: Probably the easiest to understand, this is where an insider steals either physical property or proprietary information through their access or daily duties. For example, a malicious call center employee who has access to sensitive customer information steals this data and either sells it or uses it for their own purposes. This type of threat could also lead to the theft of intellectual property or trade secrets.
  • Intentional sabotage: This is typically someone who has a vendetta against the organization or could be considered a disgruntled employee. For example, an IT administrator with privileged access who is about to get fired places a logic bomb (i.e., malware) on the network. This will allow them to delete critical data to the organization weeks after their employment is terminated.
  • Unintentional or accidental: Insider threats can also be unintentional or accidental. For example, an employee may unknowingly click on a phishing email that spreads ransomware through the organization, or a developer accidentally deploys insecure code to a production website, which leads to the organization being compromised.

 

How to Prevent Insider Threats?

Creating a mitigation strategy within your organization to prevent insider threats should be part of any robust cybersecurity program. Here are three tips that provide the basis for any solid insider threat mitigation strategy:

 

  • Know who your employees, contractors and vendors are: Your first step is to understand who your staff are, what they do, and what type of access they have. This also speaks to the organization’s culture. Do you have a supportive and protective culture that would support an insider threat mitigation program, or are you potentially creating insider threats through a negative and unsupportive company culture?
  • Know your critical assets and where they are located: Next, you need to conduct an asset inventory and identify your critical assets. Critical assets may be anything from a customer database, intellectual property, or the CEO’s email. Once these assets are identified, determine if you have the right access controls, monitoring and training around your critical assets.
  • Continually assess your organization’s risk, monitor, and engage: Prioritize and conduct frequent risk assessments and deploy robust network monitoring and logging. Finally, you need to engage your staff about insider threats through security awareness training, identify staff that may be prone to becoming an insider threat, and monitor or coach these individuals about insider threats if necessary.
Source: Tom Eston AVP of consulting, Bishop Fox
Tags: Prevent Insider Threats in Your Organization
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version