Keys to Mitigating Insider Threats
2023-7-28 15:42:48 Author: hakin9.org(查看原文) 阅读量:8 收藏

Cyber threats can come from anywhere. For organizations facing an onslaught of external attacks, it’s easy to forget that fact. However, insider threats have fast become an equally serious threat to modern businesses; research from Gurucul revealed that 74% of organizations felt insider attacks have become more frequent – up 6% from the previous year.   Organizations must recognize that a security program is only complete with effective insider threat mitigation protocols. It’s no use armoring your back if you leave your soft underbelly exposed. This article will outline some best practices for mitigating insider threats.   Defining Insider Threats   Organizations need a working understanding of what an insider threat is before they can mitigate them. An insider threat is anyone using their current or former access to or knowledge of an organization’s resources, including personnel, facilities, information, equipment, networks, and systems, to harm the organization.    According to the Cybersecurity and Infrastructure....

Read the rest of this story with a free account.

Sign up with Google Sign up with Facebook Sign up with email

Already have an account? Sign in

Author


文章来源: https://hakin9.org/keys-to-mitigating-insider-threats/
如有侵权请联系:admin#unsafe.sh