Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.

Mandatory Access Control vs Discretionary Access Control: Which to Choose?

Access control is one of the most important cybersecurity practices. Careful adjustment of users’ access rights helps to secure sensitive data and reduces the chance of a successful attack. However, choosing an access control model relevant to your organization can be tricky. In one of our previous posts, we reviewed role-based and attribute-based access control models. This article discusses use cases for mandatory and discretionary access control models.

Pentagon Data Leak Shows the Danger an Insider Threat Presents

U.S. officials confirmed last week that a member of the military photographed and uploaded more than 50 classified documents to a Discord server and other social media sites, again reminding us of the danger insider threats can present to any organization. According to the Associated Press, a member of the U.S. Air National Guard was arrested last week in Massachusetts in connection with the leak.

How To Detect and Prevent Insider Threats

‍Insider threats are one of the biggest internal cyber threats to organizations because they are often detected too late, and the responsible individual has access to sensitive information that gets released or exposed. Insider threats can pose a significant concern for organizations of all sizes and industries because they can result in severe financial and reputational damage and even legal penalties.

10 Steps to Pain-Free GDPR Compliance

The General Data Protection Regulation (GDPR) is often considered the strictest regulation in the world for securing users’ personal data, with fines for non-compliance reaching more than €20 million. The GDPR applies to all organizations processing the personal data of European Union (EU) residents. Do you find it daunting to read through the complex articles of this regulation?

5 Strategies for Cutting the Costs of Insider Threats

The costs associated with insider threats continued to rise in 2022. This is bad news for organizations that are already under financial pressure from the uncertainty of the economy. As interest rates continue to climb and customers become more conservative about how they spend, the last thing that any organization needs is to be putting out fires from security incidents coming from arsonists inside their own house.

How Can You Identify and Prevent Insider Threats?

If cyber threats feel like faceless intruders, you’re only considering a fraction of the risk. Insider threats pose a challenge for organizations, often catching them by surprise as they focus on securing the perimeter. There is a bright side, however. Understanding the threat landscape and developing a security plan will help you to mitigate risk and prevent cyber incidents. When designing your strategy, be sure to account for insider threats.

How To Prevent Overprivileged Data Access From Harming Your Business

Privileged access management was designed to prevent human errors and reinforce security in general. However, even though this approach has been used for decades, studies still show that human error contributes to 95% of cyber attacks. So what are organizations doing wrong? Are they using privileged data access in the best way possible? Sadly, many companies don’t put much thought into using their security systems correctly, but there is an easy way to fix this.

Defend against insider threats with LimaCharlie

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) defines insider threat as “the potential for an insider to use their authorized access or understanding of an organization to harm that organization.” The nature of insider threats is fairly wide-ranging. Most of us in the security field will naturally think of insider threats in cybersecurity terms, but CISA’s definition includes things like espionage, terrorism, and workplace violence.

Motivations for Insider Threats: What to Watch Out For

While a majority of discourse in the cybersecurity industry is focused on external threats – malicious hacking, phishing, and the like – the fact is that internal actors are just as capable of causing damage to an enterprise, if not more so. An insider threat may have access to resources or areas of the network that someone outside the organization would need to do extra work to obtain.