* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Monday, June 16, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    Elisabeth Moss’ ‘Handmaid’s Tale’ Emmy chances, by the numbers – Yahoo

    Elisabeth Moss’ ‘Handmaid’s Tale’ Emmy chances, by the numbers – Yahoo

    ‘Gangs of London’ Producer Explains Season 3 Deaths, Hypes Season 4 – Citizen Tribune

    Gangs of London’ Producer Reveals Shocking Season 3 Deaths and Teases Exciting Season 4

    The Iconic Missouri Diner That Gives You A Taste Of Live Entertainment With Your Meal – Yahoo

    Savor Delicious Meals While Enjoying Live Entertainment at Missouri’s Iconic Diner

    Keke Palmer Revealed How She Came Up With Her Son Leodis’ Name – Yahoo

    Keke Palmer Shares the Heartwarming Story Behind Her Son Leodis’ Name

    The Media and Entertainment Deal Machine Is Revving Up – WSJ

    The Media and Entertainment Deal Machine Is Gearing Up for Action

    Op-Ed: Data Storage and Protection in Today’s Media & Entertainment Industry – Sports Video Group

    How Data Storage and Protection Are Transforming the Media & Entertainment Industry

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Further Upside For Aeries Technology, Inc (NASDAQ:AERT) Shares Could Introduce Price Risks After 27% Bounce – simplywall.st

    Further Upside For Aeries Technology, Inc (NASDAQ:AERT) Shares Could Introduce Price Risks After 27% Bounce – simplywall.st

    Editor’s Pick: 9 Books on Technology – The Gospel Coalition

    9 Must-Read Books That Will Completely Transform How You Understand Technology

    New Semiconductor Technology Could Supercharge 6G Delivery – SciTechDaily

    Revolutionary Semiconductor Technology Set to Turbocharge 6G Connectivity

    UTC To Host Quantum Technology Workshop June 23-25 – Chattanoogan.com: Breaking News

    Join the Quantum Technology Workshop This June 23-25!

    Rimac Technology Powers the Bugatti Tourbillon with Cutting-Edge Battery and Powertrain Tech – Rimac Newsroom

    Rimac Technology Drives the Bugatti Tourbillon with Revolutionary Battery and Powertrain Innovation

    “Co-creation” boosts commercial technology for dual-use defense applications – Breaking Defense

    “Co-creation” boosts commercial technology for dual-use defense applications – Breaking Defense

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Elisabeth Moss’ ‘Handmaid’s Tale’ Emmy chances, by the numbers – Yahoo

    Elisabeth Moss’ ‘Handmaid’s Tale’ Emmy chances, by the numbers – Yahoo

    ‘Gangs of London’ Producer Explains Season 3 Deaths, Hypes Season 4 – Citizen Tribune

    Gangs of London’ Producer Reveals Shocking Season 3 Deaths and Teases Exciting Season 4

    The Iconic Missouri Diner That Gives You A Taste Of Live Entertainment With Your Meal – Yahoo

    Savor Delicious Meals While Enjoying Live Entertainment at Missouri’s Iconic Diner

    Keke Palmer Revealed How She Came Up With Her Son Leodis’ Name – Yahoo

    Keke Palmer Shares the Heartwarming Story Behind Her Son Leodis’ Name

    The Media and Entertainment Deal Machine Is Revving Up – WSJ

    The Media and Entertainment Deal Machine Is Gearing Up for Action

    Op-Ed: Data Storage and Protection in Today’s Media & Entertainment Industry – Sports Video Group

    How Data Storage and Protection Are Transforming the Media & Entertainment Industry

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    Further Upside For Aeries Technology, Inc (NASDAQ:AERT) Shares Could Introduce Price Risks After 27% Bounce – simplywall.st

    Further Upside For Aeries Technology, Inc (NASDAQ:AERT) Shares Could Introduce Price Risks After 27% Bounce – simplywall.st

    Editor’s Pick: 9 Books on Technology – The Gospel Coalition

    9 Must-Read Books That Will Completely Transform How You Understand Technology

    New Semiconductor Technology Could Supercharge 6G Delivery – SciTechDaily

    Revolutionary Semiconductor Technology Set to Turbocharge 6G Connectivity

    UTC To Host Quantum Technology Workshop June 23-25 – Chattanoogan.com: Breaking News

    Join the Quantum Technology Workshop This June 23-25!

    Rimac Technology Powers the Bugatti Tourbillon with Cutting-Edge Battery and Powertrain Tech – Rimac Newsroom

    Rimac Technology Drives the Bugatti Tourbillon with Revolutionary Battery and Powertrain Innovation

    “Co-creation” boosts commercial technology for dual-use defense applications – Breaking Defense

    “Co-creation” boosts commercial technology for dual-use defense applications – Breaking Defense

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Technology

Underestimating the dangers within: mitigating the insider cyber threat

April 18, 2024
in Technology
Underestimating the dangers within: mitigating the insider cyber threat
Share on FacebookShare on Twitter

A computer being guarded by cybersecurity.

(Image credit: iStock)

The cybersecurity risks that businesses are often most concerned about come from external attacks. But at the same time, threats – both by accident or with malicious intent – by their own employees are overlooked, despite accounting for 58% of cybersecurity breaches in recent years.

As a result, a large proportion of businesses may lack any strategy to address insider risks, leaving them vulnerable to financial, operational and reputational harm.

Understanding the risk

Insider threat has always had the mystique of espionage and spies – but usually it’s nothing of the sort. At one end of the spectrum, you’ve got people who are trying to get access to company data and then accidentally share information, or disgruntled employees. And on the other end, you have nation state actors who could be attempting to access sensitive information from government and corporations or disrupt critical national infrastructure.

It’s a delicate issue for businesses to tackle, because anybody could intentionally or unintentionally be an insider threat, and a balance must be found between the security of an organization versus the personal liberty of an individual.

The first obstacle to implementing effective cybersecurity strategies is when the risk at hand is not fully understood. How do you determine what kind of protective controls you put into place to stop the potential exfiltration of data or disruption when there are so many different motives and methods?

Paul Lewis, CISO, Nominet.

Detection, not surveillance

Firstly, a line should be drawn between employee monitoring for possible signs of insider risk and employee surveillance. The latter could have a negative impact on company culture, and ignores the important balance between security and liberty and the legal safeguards that exist.

That being said, some form of threat mitigation and detection should still be in place. One useful tool in the armory is web content URL filtering that blocks malicious websites, for example if you click on a phishing email, or accidentally visit a malicious website and inadvertently open your organization to risk. Technology like this typically works hand in hand with Data Leakage Prevention (DLP). DLP uses keywords and analytics to look for data or information that is sensitive, such as credit card numbers or personally identifiable information and blocks that information leaving the organization.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Because these types of tools can effectively track browsing habits, they must be tightly controlled and only a small number of people in an organization should have access to that data. Even so, that must go through multiple layers of approval. Business leaders must trust their employees, demonstrate that they do, and only use these tools as safety nets. It’s better to try and detect, protect, and solve the problem.

Put effective intervention methods to use

Background checks and vetting are important measures for mitigating the possibility of an insider threat from the very outset. But when it comes to managing an existing team, other methods will have to be explored. For systems and services, audit records and the cyber equivalent of double entry book-keeping should be considered, for instance.

Organizations that are more mature may use honeypots or canary tokens to decoy information on their system that looks sensitive but is fake; if anybody accesses this system or releases information, it can be tracked very easily and, if disturbed, is a good indicator of an insider threat.

Adopting a deterrence strategy is also useful, such as information classification. Systems with a large amount of sensitive information stored in them, data that could be sold or retained to use against someone, are going to be clear targets for insiders. A protective marking on it, such as “confidential”, could either entice or deter these individuals, as it makes clear that certain information is important, tracked and handled cautiously. This allows organizations to ring fence and apply controls to the specific information that is sensitive to them.

Responding to an insider incident

Incident response to insider threats is very similar to other types of data breaches, but with one significant caveat. As an employee they are by default a trusted individual. Therefore, they are potentially able to do significantly more damage than an external threat actor as they know the internal workings of the company and their way around potentially complex systems. Revoking complete access for any employee, for instance, should be a matter of priority when trying to mitigate the impact of any insider threat when suspected of carrying out a malicious breach.

Reporting the incident is ultimately the same type of process, but the way organizations initially approach the individual will differ from third-party actors. It’s especially important, in these circumstances, to have irrefutable evidence, as accusing somebody who is innocent could also cause significant damage to a business and the individual.

Insider threats too often sit in the blind spot of businesses. But by focusing on external threats exclusively – perhaps in favour of avoiding tension or perceptions of mistrust in the workplace – organisations and their employees are left vulnerable to the genuine threat insiders pose, often greater than the threat posed by third-party actors. It is a crucial element of any robust cyber strategy, and not to be overlooked.

We’ve listed the best identity management software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Paul Lewis, CISO, Nominet.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : TechRadar – https://www.techradar.com/pro/underestimating-the-dangers-within-mitigating-the-insider-cyber-threat

Tags: dangerstechnologyunderestimating
Previous Post

The road to analytics excellence is paved with automation

Next Post

‘BJP wants to impose one history, one language’

Safran and Bombardier announce defense technology innovation partnership – Safran

Safran and Bombardier Forge Groundbreaking Partnership to Revolutionize Defense Technology

June 16, 2025
Bee-lieve the buzz: Honeybees help Delaware agriculture, ecology – Bay to Bay News

Bee-lieve the buzz: Honeybees help Delaware agriculture, ecology – Bay to Bay News

June 16, 2025
NCSE welcomes Britt Miller – National Center for Science Education

NCSE welcomes Britt Miller – National Center for Science Education

June 16, 2025
Science is on the federal chopping block and North Carolinians will suffer – NC Newsline

Federal Science Funding Slashed: How North Carolinians Will Be Impacted

June 16, 2025
Does yard work count as exercise? UI expert provides tips to maintain a healthy lifestyle during busy summer months – Iowa Now

Is Yard Work Really Exercise? Expert Tips for Staying Healthy During Busy Summer Months

June 16, 2025
Insurers must promote the blue economy – Eco-Business

Insurers must promote the blue economy – Eco-Business

June 16, 2025
Elisabeth Moss’ ‘Handmaid’s Tale’ Emmy chances, by the numbers – Yahoo

Elisabeth Moss’ ‘Handmaid’s Tale’ Emmy chances, by the numbers – Yahoo

June 16, 2025
Tariffs Are Driving 2026 Health Insurance Premiums Up – KFF

Tariffs Are Driving 2026 Health Insurance Premiums Up – KFF

June 16, 2025
Minnesota, Known for Bipartisan Civility, Reels After Attack on Lawmakers – The New York Times

Minnesota, Known for Bipartisan Civility, Reels After Attack on Lawmakers – The New York Times

June 16, 2025
FDA Grants Sarepta Therapeutics Platform Technology Designation to Expedite Gene Therapy Reviews – geneonline.com

FDA Accelerates Gene Therapy Reviews with Breakthrough Platform Technology for Sarepta Therapeutics

June 16, 2025

Categories

Archives

June 2025
MTWTFSS
 1
2345678
9101112131415
16171819202122
23242526272829
30 
« May    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (689)
  • Economy (703)
  • Entertainment (21,606)
  • General (15,413)
  • Health (9,744)
  • Lifestyle (708)
  • News (22,149)
  • People (705)
  • Politics (710)
  • Science (15,921)
  • Sports (21,202)
  • Technology (15,689)
  • World (683)

Recent News

Safran and Bombardier announce defense technology innovation partnership – Safran

Safran and Bombardier Forge Groundbreaking Partnership to Revolutionize Defense Technology

June 16, 2025
Bee-lieve the buzz: Honeybees help Delaware agriculture, ecology – Bay to Bay News

Bee-lieve the buzz: Honeybees help Delaware agriculture, ecology – Bay to Bay News

June 16, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version