{"id":643,"date":"2023-05-17T23:00:07","date_gmt":"2023-05-17T23:00:07","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2023\/05\/17\/prepare-your-organization-for-insider-threats\/"},"modified":"2023-05-17T23:00:07","modified_gmt":"2023-05-17T23:00:07","slug":"prepare-your-organization-for-insider-threats","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2023\/05\/17\/prepare-your-organization-for-insider-threats\/","title":{"rendered":"Prepare Your Organization for Insider Threats"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-350434 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16125731\/Achieving-Organizational-Preparedness-for-Insider-Threats.jpg\" alt=\"\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16125731\/Achieving-Organizational-Preparedness-for-Insider-Threats.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16125731\/Achieving-Organizational-Preparedness-for-Insider-Threats-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/05\/16125731\/Achieving-Organizational-Preparedness-for-Insider-Threats-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>Does it feel like everywhere you turn, you\u2019re hearing about another cybersecurity incident? Another business, perhaps even in your industry, has fallen victim to a scam. Another threat to prepare for?<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">This article is another warning \u2013 but don\u2019t let that stop you from reading on.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">It\u2019s true that cybercrime is on the rise, with a projected value of $10.5 trillion by 2025. Cybercriminals are growing more cunning, developing innovative ways to exploit weaknesses, breach network, and app security, or even use end users as pawns to get what they want: oftentimes, your valuable data.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">But it\u2019s not only those making a career in deception that you need to worry about. Sometimes, the threats hit a little closer to home.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Insider Threats<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Unlike phishing scams and denial of service (DDoS) attacks, insider threats arise within your organization. These threats are perpetrated by trusted end users such as employees, contractors, vendors, partners, or service providers. Insider threat incidents may be:<\/p>\n<p><strong>Unintentional threats<\/strong> due to human error or negligence. These non-malicious incidents can occur through phishing, social engineering, accidental disclosure, lost\/stolen data or devices, improper disposal of data\/devices, or naivety, such as trusting links or message requests to perform a function.<\/p>\n<p><strong>Malicious attacks<\/strong> by those who knowingly commit a cybercrime. Malicious attacks include data, device, or intellectual property theft, IT sabotage, and fraud. Employees \u2013 current or existing\/former \u2013 may execute these schemes for various reasons. They may steal IP to further their career, steal data (such as financial or end user details) to sell on the dark web, or seek revenge by sabotaging your organization. They may work alone, collaborate with other insiders, or be coerced by people outside your network.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Understanding insider threats is the first step to achieving organizational preparedness to avoid falling victim.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">Keys to Organizational Preparedness for Insider Threats<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">It\u2019s not all doom and gloom, and trust no one is a more preventative measure than a tin foil hat concept. The suggestion is not to move throughout your organization assuming the worst of everyone, but to build in tools and awareness to keep a keen eye out for signs of insider threats.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Manage Third-party End Users<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Sometimes, organizations are so focused on securing their network and endpoints that they forget about the peripheral danger: third parties. Contractors, vendors, suppliers, and service providers can also pose a cyber risk. These users all have access to your network and data to varying degrees, depending on the nature of their role or relationship with your company. To mitigate risk, it\u2019s crucial to ensure these users have only the access they need, their activity is monitored, and their accounts are swiftly offboarded when they are no longer needed.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Departing Employees<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Employees leave for any number of reasons. Sometimes it\u2019s amicable, like taking a job offer they can\u2019t refuse, taking time off to spend with their family, or retirement. Sometimes it\u2019s less cordial, such as termination or friction with management. Unfortunately, even the smoothest departures can result in insider incidents.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Departing employees may take data with them for a leg up in their new role. They may promise intellectual property to gain a competitive edge for themselves or their employer. Or, they may sabotage your systems or data on their way out. Regardless of their motivation, exiting employees pose a risk.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Ensure you offboard accounts as soon as possible when employees depart. If the employee has given notice, pay attention to their network activity in the days or weeks leading up to their departure if they make any unusual movements. Hold exit interviews, where possible, and ensure you clarify to these employees what qualifies as illegal or risky behavior and that they understand there may be consequences.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Use Behavioral Analytics<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Many insider threats can be indicated by unusual network activity. Behavioral analytics will monitor and alert you of any distinctive activity, such as large file downloads or uploads, credential abuse, or unusual access patterns. These tools will track, collect, and analyze end-user data to spot outliers and, hopefully, mitigate risk before it becomes an incident.<\/p>\n<h3 style=\"color: #002855; font-size: 20px; font-family: Montserrat; font-weight: 500; line-height: 24px;\">Create a Risk-aware Culture<\/h3>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Human employees can be your greatest asset and your greatest liability. Negligence or naivety can cost your organization dearly, and it can be easily avoided. Address human error proactively by conducting ongoing training and creating a risk-aware culture.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">A risk-aware culture has cyber risk woven into its lexicon. Starting with onboarding and all the way through, employees should be accustomed to hearing, talking, and learning about the risks that may affect them, their team, and the organization.<\/p>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\">Conduct regular insider threat awareness training to highlight the risk of human error and negligence, and to shine a light on malicious risky behavior. After all, your employees can also be whistleblowers and should know when to report suspicious activity. Employees should also know who to contact if they make a mistake, understanding that things may happen no matter how careful they are. Of primary importance is to react and resolve the issue quickly.<\/p>\n<h2 style=\"color: #002855; font-size: 24px; font-family: Montserrat; font-weight: 500; line-height: 29px;\">About the Author<\/h2>\n<hr style=\"text-align: left; width: 30%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; font-family: Open Sans; font-weight: 400; line-height: 1.7em;\"><img decoding=\"async\" loading=\"lazy\" class=\"img-responsive alignleft wp-image-321966 size-thumbnail\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/03234905\/Stephanie-Shank-headshot-150x150.png\" alt=\"Stephanie Shank headshot\" width=\"150\" height=\"150\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/03234905\/Stephanie-Shank-headshot-150x150.png 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/03234905\/Stephanie-Shank-headshot-100x100.png 100w, https:\/\/ieeecs-media.computer.org\/wp-media\/2023\/01\/03234905\/Stephanie-Shank-headshot.png 160w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\"\/>Stefanie Shank. Having spent her career in various capacities and industries under the \u201chigh tech\u201d umbrella, Stefanie is passionate about the trends, challenges, solutions, and stories of existing and emerging technologies. A storyteller at heart, she considers herself one of the lucky ones: someone who gets to make a living doing what she loves. Stefanie is a regular writer at Bora.<\/p>\n<p>\u00a0<\/p>\n<div style=\"background-color: #d4f1f4; padding: 15px 15px 10px 15px;\">\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><strong>Disclaimer:<\/strong> The author is completely responsible for the content of this article. The opinions expressed are their own and do not represent IEEE\u2019s position nor that of the Computer Society nor its Leadership.<\/p>\n<\/div><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/trends\/preparing-your-organization-for-insider-threats\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Does it feel like everywhere you turn, you\u2019re hearing about another cybersecurity incident? Another business, perhaps even in your&hellip;<\/p>\n","protected":false},"author":1,"featured_media":644,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,593,594,2],"tags":[],"class_list":["post-643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-insider-threats","category-organization-preparedness","category-tech-news-post"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=643"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/643\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/644"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}