Tag: Insider threat
August 9, 2022 |
Insider Threat Detection
Insider threat incidents have increased by 44% over the past two years, and the cost of an incident now tops $15.3 million, according to the 2022 Cost of Insider Threats report from Ponemon.
To defend against this pressing security — and business — risk, organizations need a comprehensive...
June 23, 2021 |
Understanding Insider Threats and How to Defend Against Them
Insider threats are a growing cybersecurity concern. A 2022 study by Ponemon found that the cost of insider threats leaped 44% in just two years, with the per-incident cost now $15.8 million. The report also shows that it takes companies an average of 85 days to contain an insider threat...
June 6, 2019 |
Who Is to Blame for a Data Breach? Answers to the Most Pressing Questions
The Netwrix 2018 IT Risks Report presents new research into the security threats organizations are facing and the actions they are taking to minimize IT risks. The report explores six IT risks: physical damage, intellectual property theft, data loss, data breaches, system disruptions and compliance...
December 28, 2017 |
5 Ways to Reduce the Risk of Employee Theft of Confidential Information
Departing employees can be a big source of data leakage for organizations; in fact, there are at least 5 reasons why departing employees can be a real pain. So we need to take a closer look into how to reduce this risk.
Of course, as soon as an employee leaves the company — whether because...
December 7, 2017 |
7 Tips to Avoid Data Theft by Ex-Employees
By Pierre Dehombreux, Director of Information Technology, Whiteriver Unified School District
Disabling the user accounts of fired employees right after their dismissal does not guarantee they won’t break through your defenses. For example, they can bribe friendly and perhaps sympathetic former...
November 14, 2017 |
Hot Tips: How to Harden Privileged Account Security
Privileged accounts are user accounts with extended permissions to access systems and data, such as the root account in Unix and Administrator accounts in Windows. Sometimes they are called “the keys to the kingdom” because a privileged account enables you do things ordinary users can’t, such...
November 9, 2017 |
Key Lessons Learned from Data Breaches Caused by Privilege Abuse
In a previous blog post, “Privilege Abuse: Threat Alert,” we provided an overview of what privilege abuse is and why this threat is so serious. In today’s post, we will look at the problem from a different angle. We’ll examine four notorious data breaches caused by privileged account abuse...
October 30, 2017 |
Top 5 Reasons Why Departing Employees Can Be a Security Nightmare
Employees taking sensitive company information with them when they leave their jobs might seem like the stuff of nightmares, but it’s actually a common true horror story. Biscom’s research, for example, found that one in four respondents took data when leaving a company. It’s easy to find...
October 26, 2017 |
Employee Data Theft: How to Mitigate the Risk
Picture your IT infrastructure as a castle that houses your most critical data. Just a few years ago, the best way to defend those “crown jewels” was to build a virtual moat around the perimeter of your castle.
Times have changed though, and firewalls and intrusion-detection systems aren’t...
October 24, 2017 |
Privilege Abuse: Threat Alert
Talking with IT pros, I hear a lot about security issues, and one story is extremely common. The details vary, but at the core is the same threat: privilege account abuse or misuse. In this post, I’ll explain what privilege abuse is, the benefits real companies are realizing by keeping an eye on...