Connect with us

Hi, what are you looking for?

Tech & Science

Cybersecurity: The biggest risk can be from the inside

In many a horror movie it is thought the bad guy is on the outside when actually the villainous protagonist is lurking inside. The same is so for enterprise cybersecurity. It follows that more companies are taking notice of the risks that insiders can pose to the company’s data security.

It follows that many organizations have, often mistakenly, put their time and effort into defending fixed perimeters. However, the chances are good that the threat already exists on the enterprise network, according to research published in TechRepublic.

Examples of insider threats include deliberate attempts to steal it or leak data. If someone wants to do this, then they can usually do so with far greater ease than outsiders. People leaving jobs who are disgruntled or former employees who hold a grudge can be the types of people motivated to cause harm.

However, the main insider risk arises from insiders who end up accidentally leaking data or engaging in behaviours that end up putting data at risk. Examples include attaching the wrong file to an email being sent, sharing the wrong thing on social media, losing a laptop or USB drive, or another kind of error that puts an organization’s data at risk.

A related risk area is relying on consultants who may also remove data without checking or introduce hardware of software that has not been correctly vetted.

This reality calls for an entirely new kind of cybersecurity posture, one in which businesses remain vigilant at all times and view their environments as if they have already been compromised. This is drawn out in the Unisys Security Index for 2019. The review also calls for new solutions that can quickly and dynamically isolate threats within enterprise IT environments.

In line with National Cybersecurity Awareness Month there is a call for enterprises to better protect themselves from both outside and inside threats by employing a zero-trust posture, which involves the use of dynamic isolation and microsegmentation technologies.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

The groundbreaking initiative aims to provide job training and confidence to people with autism.

Tech & Science

Microsoft and Google drubbed quarterly earnings expectations.

Entertainment

Steve Carell stars in the title role of "Uncle Vanya" in a new Broadway play ay Lincoln Center.

Business

Catherine Berthet (L) and Naoise Ryan (R) join relatives of people killed in the Ethiopian Airlines Flight 302 Boeing 737 MAX crash at a...