Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Insider Threats

The latest News and Information on Insider Threats including employee monitoring and data privacy.


How analyzing employee behavior can improve your cybersecurity posture

Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology manifests within most of our minds. Organizations often neglect human behavior's impact on their cybersecurity postures. Instead, they spend lavishly on endpoint security tools, threat hunting programs, and building incident response plans. Admittedly, these security measures are a crucial part of mitigating attacks.


Top Tips in Honor of National Insider Threat Awareness Month

As National Insider Threat Awareness Month draws to a close, Egnyte is taking this opportunity to reinforce everyday best practices that companies like yours need to follow. The goal of the month is to educate U.S. government and industry leaders about the risks of insider threats and how to effectively address them.


Top 10 Best Practices for Privileged User Monitoring

Privileged users are an essential part of any organization. However, with access to commercial secrets and to the most vulnerable parts of the corporate network, they can pose high risks to your corporate cybersecurity. For this reason, the more privileges users have, the closer they need to be monitored. Furthermore, privileged user monitoring (PUM) is a requirement of multiple laws, regulations, and data security standards including PCI DSS, SOX, NIST SP 800 171, NIST 800-53, GDPR and HIPAA.


Insiders cause 20% of data breaches

Apart from external attackers, organizations need to consider another type of threat when planning their cybersecurity strategy: insider threats. There are different types of insiders. On the one hand, there are people who have secret knowledge and unintentionally create risk openings within an organization; and on the other, there are others who intend to cause harm, motivated by profit, extortion, or personal grievance. This means insiders can be classified as follows.

Automating insider threat monitoring

From ingestion of relevant data sources to automation around threat monitoring, the security engineering team at Netskope utilizes Sumo Logic as a key tool in the protection of their intellectual property. Join this session to learn how something that began as an idea for an easy-to-use dashboards developed into a near completely automated process for data collection and correlation for investigating suspicious activity.

Overheard at the SANS Security Awareness Summit 2022

People have become the primary attack vector for cyber attackers around the world. As the Verizon Data Breach Investigations Report 2022 indicates, it is humans rather than technology that now represent the greatest risk to organizations. According to the SANS 2022 Security Awareness Report, the top three security risks that security professionals are concerned about are phishing, business email compromise (BEC) and ransomware, all closely related to human behavior.


Responding to Change: How to Improve Your Organization's Cybersecurity

The world is changing rapidly, with organizations facing new cybersecurity challenges all the time, forcing them to continuously update their cybersecurity strategies. This is especially relevant when it comes to events that have a global effect, like the COVID-19 pandemic and Russia's invasion of Ukraine.


When To be Suspicious About Work-From-Home Employees (or Not)

Perhaps someone doesn’t answer a Slack message as quickly as they should, or they have long hours blocked on their calendar. Maybe someone doesn’t seem motivated during team meetings or they are slow to complete work. While research has shown that overall, productivity has actually increased as a result of the work-from-home movement, managers know all too well what it’s like to be suspicious that someone is taking advantage of their new work arrangement.


Data Loss Prevention (DLP) Systems: Main Advantages and Disadvantages

As the number and severity of cybersecurity attacks rise each year, organizations are compelled to look for measures to protect sensitive data. The abundance of cybersecurity solutions on the market may create confusion and pressure, as choosing the wrong one may lead to security gaps. Many companies turn to data loss prevention (DLP) systems, since they have been on the market for years. But is a DLP system enough to protect your data?


8 Poor Privileged Account Management Practices and How to Improve Them

Establishing proper privileged account management procedures is an essential part of insider risk protection. There are some common mistakes companies make when managing accounts of privileged users. In this article, we overview eight widespread poor account management practices, analyze their consequences, and discuss ways to improve them. We also take a look at Ekran System’s account management capabilities that you can benefit from.