Daily Intel

  • Mitigating Remote Risk in Identity Management: The Capabilities You Need
    on April 3, 2020 at 8:15 pm

    What remote risks do enterprises face in the wake of the coronavirus? What identity management capabilities can help your organization mitigate ... to the access request process better protects your enterprise from external threats.

  • Steel Long Products Research Segment (2020-2029) || ArcelorMittal, Posco, Nssmc
    on April 3, 2020 at 6:45 pm

    In this report, the global Steel Long Products market is esteemed at USD ... in contrast to an in-depth analysis of external threats and opportunities. ... and inside value related components that are affecting your organization.

  • 10 Crisis Management Tactics For Managing Internal Problems
    on April 3, 2020 at 5:15 pm

    Companies sometimes face lingering internal problems that no approach ... share what you can when you can with both internal and external stakeholders. ... likely threats to your business, long before those threats become a reality. ... It's no easy exercise, but whether you're a company or an individual, ...

  • Why is the Holistic Cybersecurity Approach Important?
    on April 3, 2020 at 2:26 pm

    Regardless of what business you are in, holistic cybersecurity is deemed to be ... Cybersecurity is too great of a risk to ignore or treat with sidelines. ... Insider threats in light of the danger they cause come on par with external threats.

  • Establishing Secure Data Management Best Practices
    on April 3, 2020 at 1:06 pm

    You should be taking steps to ensure your organization is establishing ... protocols and due diligence expectations for both internal and external use. ... help identify and resolve data security weaknesses or threats for your vendors.

Dark Reading: Insider Threats Dark Reading: Connecting the Information and Security Community

  • Insider Threats – the Trickiest Risk the Firms Need to Combat
    on April 4, 2020 at 1:52 am

    A recent study by Crowd Research Partners confirmed that almost 90% of organizations feel vulnerable to insider attacks and cyber threats. Bring your ...

  • 10 Crisis Management Tactics For Managing Internal Problems
    on April 3, 2020 at 5:15 pm

    Mismanaging bad publicity following an internal crisis can be disastrous (if not ... With that in mind, preparedness is key -- develop a crisis plan for the most likely threats to your business, long before those threats become a reality.

  • Establishing Secure Data Management Best Practices
    on April 3, 2020 at 1:06 pm

    You should be taking steps to ensure your organization is establishing ... protocols and due diligence expectations for both internal and external use. ... help identify and resolve data security weaknesses or threats for your vendors.

  • Employee Theft in Today's Climate
    on April 3, 2020 at 9:33 am

    The increased pressure on employees both working both in-person and remotely opens up an additional security risk for companies: employee theft.

Every business has to deal with threats to their business, but an insider threat is something many take for granted. Sometimes the threat is really from inside…

The definition of an Insider Threat is

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization’s security practices, data and computer systems.

Oblivious Insider. This insider threat takes after its namesake, and it’s a top cause for data breaches in today’s world. These insiders have important access to company files, and they’ve been compromised from the outside without knowing. This most likely came to be when they clicked on a malicious phishing email that granted the criminal access.

Negligent Insider. These employees are most vulnerable to phishing emails. Due to lack of security education, or simply their interest in bypassing workplace protocol to meet efficiency, these individuals are a top threat to data loss.

Malicious Insider. This is where the insider crosses the line, and data loss becomes intentional. They seek to delete important company information, and inflict financial harm in some way. Luckily, there are several behavioral trends that fellow employees and managers can watch out for to ping these insiders.

In an article from May 2016, the Wall Street Journal referenced a Deloitte “Dbriefs” report in which they present some alarming numbers on corporate malicious activity by trusted insiders:
• 92 percent of insider threat cases were preceded by a negative work event, such as a termination, demotion or dispute with a supervisor.
• 97 percent of insider threat cases studied by Stanford University involved an employee whose behavior a supervisor had flagged, but that the organization had failed to follow up on.
• 25 percent of employees have used email to exfiltrate sensitive data from an organization.

How pervasive is the insider threat in your company?
The Dtex 2018 Threat Report serves to bring to the forefront those areas where companies, and that is every company, big or small, can invest their resources to bring down the threat posed by their trusted insiders.”

Clearly, visibility on the need to focus on basic cybersecurity 101 is required. Richard Stiennon, IT-Harvest Chief Research Analyst and Charles Stuart University Lecturer, tells us, “Business needs to get out of the cybersecurity denial phase it is stuck in. To do this, it must accept that it needs more visibility into what’s going on in its environment.”

DTex Systems “THE 2018 INSIDER THREAT INTELLIGENCE REPORT”

 

 

FBI 5 Best Practices For Combatting The Insider Threat In Your Business

  1. Focus on deterrence, not detection. In other words, create a culture that deters any aberrant behavior so that those who continue to practice that behavior stand out from the “noise” of normal business and the limited investigative resources that you have can be focused on them.
  2. Know your people, know who your weak links are and who would be most likely to be a threat.
  3. Use your HR data to narrow down threats rather than looking for a needle in stack of needles.
  4. Identify information that is most likely to be valuable to someone else and protect it to a greater degree than the rest of your information.
  5. Monitor ingress and egress points for information (USB ports, printers, network boundaries).
    Baseline normal activity and look for anomalies.