Cyber Risk and Attacks can Start on the Inside!
Brian Silverman
Responsible for Helping organizations realize the Business Value of AI!
With continued focus and articles written about the cyber criminal, including known threats and attacks, we often forget that many cyber attacks, such as phishing schemes and compromised user authentication, start from an internal user.
In an article in Tech Target, "Top 10 types of information security threats for IT teams," the first threat mentioned was insider threats. "These threats occur because employees or anyone with access to systems, networks, and data are either maliciously or accidentally exposing companies information, or expose servers and systems to cyber criminals external to the company."
It could even be as simple as an employee leaving their smartphone charging and connecting to the internal network. The smartphone could be infected with “stalkerware,” enabling a cyber thief to monitor activity on the phone along with connected networks and systems. It could also be an employee including too much personal information on Social media, making the guessing game to answer Multi-factor authentication questions much easier.
The best strategy for companies is to design and implement a security strategy built on a Zero-Trust architecture. This approach needs to assure the trust and identity of users, protect against threats, and can quickly respond to and remediate security attacks.
领英推荐
TekMonks has a portfolio of security solutions with these principles in mind:
No two companies face the same security challenges. If you would like to discuss your environment and how the TekMonks team can help with your security strategy and the right security solutions to protect your company and those internal users, please contact me on LinkedIn or the TekMonks team at [email protected].