Reduce Risk: Six Vulnerable Points Enterprises Need to Consider

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Reduce Risk: Six Vulnerable Points Enterprises Need to Consider-2 Next

Insider threat

Authoritative research and industry experts conclude that the majority of data theft within organizations is the result of employees, contractors and other cleared third-party personnel with access to systems, networks and sensitive data. An effective enterprise insider threat program should ensure policies, procedures, training and technology help capture the patterns arising from high-risk actors, events and behaviors of people that may result in sabotage, cyber terrorism, fraud or theft of intellectual property.

Proper insider threat assessment should leverage technical and non-technical data points to identify precursors and activities indicative of human threats, such as proactive monitoring for excessive downloading and copying of sensitive information, or training and awareness campaigns that warn employees against the threats from elicitation and other social engineering techniques.

In light of recent incidents such as the Target breach and the Heartbleed bug, security remains top of mind for IT professionals. While most security solutions address only cyber-based threats, organizations need a more proactive and holistic approach to find, fix and protect potential vulnerabilities and reduce the likelihood of a security incident. In this slideshow, Armond Caglar, senior threat specialist at TSC Advantage, presents the six domains that every organization needs to examine to reduce risk.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.