Staying ahead of the enemy within

When set to thinking about cyber threats, people’s thoughts often go immediately to the external — to bad actors outside the company. Historically, at least, the data breaches making the most noise in the news are carried out by outsiders. However, the most dangerous security threat to the modern enterprise may not in fact come from malicious outsiders at all, but from an inside source: employees.

The danger to today’s company from insiders finds expression in countless disturbing statistics, including:

  • 60% of all attacks are carried out by insiders (Source)
  • 65% of companies don’t enforce their password policy (Source)
  • 70% of millennials bring outside apps into work in violation of IT polices (Source)

Insider threats are tougher to prevent because insiders don’t often intentionally threaten their company’s data. The great majority of insider data breaches are in fact unintentional.

Familiarity is a large part of the problem. Because insiders have access to critical data and sensitive information on a regular basis, have close knowledge of how a company protects its data.

If these individuals ever, for any reason, want to steal or leak company data, they can do so with ease compared to someone without their level of familiarity. For anyone who has free access to company data, a breach can be as simple as oversharing on social media, “losing” a laptop or mobile device or USB drive, or attaching sensitive files to email “by accident.”

Keeping your company’s information safe from both malicious and unintentional breach requires a holistic approach to security. Such an approach involves giving equal attention to internal and external threats, and establishing — and then enforcing the observance of — best practices for preventing and mitigating damage from insider threats.

Join ITWC CIO Jim Love and Rob Marti, Director of Privileged Access Management at CA Technologies on Wednesday, January 31st from 1:00 pm to 2:00 pm ET for “The Threat Inside: Your employees as a security risk.” In this webinar, Love and Marti will discuss the results of the 2018 Insider Threat Report, and will share findings and best practices to help you protect your organization. REGISTER TODAY

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Glenn Weir
Glenn Weir
Content writer at IT World Canada. Book lover. Futurist. Sports nut. Once and future author. Would-be intellect. Irish-born, Canadian-raised.

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now