In case you missed our
Threats can be stopped at the source by better identifying “over-the-shoulder” risk while also detecting and capturing key evidence of insider threat activity. This simple yet critical component of data protection and threat intelligence provides unparalleled protection against persistent threats, including those inside threats.
Let’s take a closer look at the insider threat, what can be done to prevent it, and and try to understand why your conventional security products are not equipped to stop it.
What You See is What You Get
Studies by the Secret Service, Verizon Business, and CERT at Carnegie Mellon have found up to 50% of information security breaches are caused by insiders. These are employees with an axe to grind, or who see an opportunity for financial gain and become social engineers with the access and opportunity to wreak havoc. However, these social engineers are not easy to spot – demographic analysis shows no easy pattern to finding the bad apples before they spoil.
A common misconception is that these “bad apples” will be easy to find – by their hacker credentials, pasty complexion, and tendency to maliciously cackle aloud. You’re wrong. The same studies found an astonishing 42% of insider breaches involved …read more
Source:: Private Eye2