Reduce Risk: Six Vulnerable Points Enterprises Need to Consider

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Reduce Risk: Six Vulnerable Points Enterprises Need to Consider-2 Next

Insider threat

Authoritative research and industry experts conclude that the majority of data theft within organizations is the result of employees, contractors and other cleared third-party personnel with access to systems, networks and sensitive data. An effective enterprise insider threat program should ensure policies, procedures, training and technology help capture the patterns arising from high-risk actors, events and behaviors of people that may result in sabotage, cyber terrorism, fraud or theft of intellectual property.

Proper insider threat assessment should leverage technical and non-technical data points to identify precursors and activities indicative of human threats, such as proactive monitoring for excessive downloading and copying of sensitive information, or training and awareness campaigns that warn employees against the threats from elicitation and other social engineering techniques.

In light of recent incidents such as the Target breach and the Heartbleed bug, security remains top of mind for IT professionals. While most security solutions address only cyber-based threats, organizations need a more proactive and holistic approach to find, fix and protect potential vulnerabilities and reduce the likelihood of a security incident. In this slideshow, Armond Caglar, senior threat specialist at TSC Advantage, presents the six domains that every organization needs to examine to reduce risk.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.