Defend your Agency Against Internal Threats and Other Security Breaches

In the world of cyber security breaches, the warnings and headlines keep stacking one on top of the next with no end in sight. Data breaches are a ubiquitous part of the business landscape now, and decision-makers have dramatically shifted their budgetary and strategic priorities to keep their network defenses in top condition. Even if your infrastructure is rock-solid from the outside, however, you may still be vulnerable to attacks from within. Insider threat is one of the most prevalent concerns for IT security experts today, and you can't overlook this dangerous phenomenon by any means.

How insiders get the edge
Despite the many improvements made to enterprise network security in recent years, a number of trends have made it easier than ever for insiders to hijack critical information unnoticed. Developments such as bring-your-own-device policies and remote access privileges have made on-the-go content delivery a commonplace feature of the workplace, allowing end users to tap into key company databases from their smartphones, laptops and tablets. This brings about even tougher challenges for IT squads seeking the right balance between user freedom, privacy and network protection.

According to the International Business Times, insider threat may actually be more of a direct hazard to a company than external cybercriminals, as employees are often granted a fairly high level of authorization to access information. The source pointed to a report from the British Standards Institution revealing that 37 percent of Europe's top IT leaders believe rogue employees pose the greatest threat to the security of their organizations. While your priorities may be differently aligned, it would be unwise to let these issues fall by the wayside.

"Employees don't necessarily have to be malicious to put a company at risk; they may just not understand the possible risks associated with their actions," said IT Security Guru, Tom Cross, director of security research at Lancope. "Research has shown that effective staff training can halve the number of insider breaches, by ensuring employees understand the importance of information security and their role in protecting businesses' critical information."

Education and vigilance
As Cross explained to the International Business Times, knowledge is power when it comes to defending against any security threat, especially those originating from within the company's own walls. You must ensure that every end user has a crystal-clear understanding of their responsibilities to uphold best practices and remain vigilant in their observations of fellow workers. This is especially important when implementing mobility strategies, as employees tend to overlook the finer points of password protection and encryption when handling their own devices.

Mobile Enterprise affirmed this point, noting research from SpectorSoft revealing that 61 percent of respondents don't know how to defend against an insider threat. Seeing that employee fraud costs global businesses $2.9 billion annually, you may need to reconsider the way you address these internal hazards, especially in terms of educating users on proper threat identification and mitigation techniques. Rob Williams, chief marketing officer at SpectorSoft, explained that with stronger knowledge bases, insider threat can be diminished in a more efficient, organic way.

"These statistics paint a bleak picture when it comes to securing company data against insider threats," Williams told the source. "With so many data breaches happening, C-level executives are coming to the realization that their jobs could be on the line if company data isn't protected. Proper defense must include a comprehensive security solution, and with humans involved, education is just as key."

Of course, updating your infrastructure to defend against more dynamic threats is never a bad idea, either - the source noted that 55 percent of organizations cite their outdated tech layouts as a limiting factor in their efforts.

要查看或添加评论,请登录

Aaron C的更多文章

社区洞察

其他会员也浏览了