How to eliminate insider threats

Image by Thinkstock
For years, the primary security objective has been to protect the perimeter—the focus on keeping outsiders from gaining access and doing harm. But statistics prove that more risk exists within an organization. Indeed, many compliance regulations require monitoring of systems to identify and eliminate insider threat. According to Forrester, 58 percent of breaches are caused from internal incidents or with a business partner’s organization. And 55 percent of attacks are originated by an insider as cited in the 2015 IBM Cyber Security Intelligence Index.
To read this article in full or to leave a comment, please click here
Read more: How to eliminate insider threats
Story added 30. January 2017, content source with full text you can find at link above.
More antivirus and malware news?
- Dell Command Update DSA-2019-162 Multiple Arbitrary File Deletion Vulnerabilities
- Meet the Vaccine Appointment Bots, and Their Foes
- Samba exploit – not quite WannaCry for Linux, but patch anyway!
- Resolved: TSM Server Upgrade of knox.its.psu.edu scheduled for October 12th, 2017
- Armed with iOS 0days, hackers indiscriminately infected iPhones for two years
- Fake Twitter industry generating millions for abusers, Barracuda finds
- European Virus Tracing Apps Highlight Battle for Privacy
- Microsoft XML Core Services CVE-2014-4118 Remote Code Execution Vulnerability
- Twitter aims to become safer with two-step sign-in
- NSA and CISA Alert Highlights Urgency for OT Security