Connect with us

Hi, what are you looking for?

Tech & Science

Cybersecurity: Tackling the insider threat

Insider threats pose a significant risk to both private and public sectors and continue to evolve alongside new technologies.

Risk of leaving a computer unattended. — Image by © Tim Sandle.
Risk of leaving a computer unattended. — Image by © Tim Sandle.

National Insider Threat Awareness Month is full swing. The event takes place during September each year. An insider threat is a perceived threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates.

The Center for Development of Security Excellence (CDSE), a training and education provider within the Defense Counterintelligence and Security Agency (DCSA), has led the sixth annual National Insider Threat Awareness Month (NITAM) throughout the month of September.

Insider threats pose a significant risk to both private and public sectors and continue to evolve alongside new technologies, increasing the risks of shadow IT and shadow AI.

During the month supporters work collaboratively to emphasize the importance of preparing the workforce to deter, detect, and mitigate threats posed from trusted insiders.

Or Shoshani, Co-Founder and CEO, Stream.Security has provided a different perspective on the current state of insider threats to Digital Journal. Shoshani also pontificates on what this month should mean for the cybersecurity community.
 

Beginning with the importance of the event, Shoshani explains: “This National Insider Threat Awareness Month, it’s important to revisit your cloud security strategy to ensure individuals with permission to access your cloud data cannot harm businesses.”

In terms of examples, Shoshani puts forward: “From mistakenly sharing data to purposely attacking infrastructure in retaliation, sensitive data in the cloud is easier than ever to access and misuse.”

Many companies are experiencing an upsurge in insider issues, as Shoshani  points out: “With increases in insider threat attacks in the past few years, organizations must improve their approach to cloud security. Rapidly changing security needs require an organization’s response behaviours to change in tandem.”

There are measures that companies can be taking in order to address concerns. Here Shoshani suggests: “Using real-time cloud security tools to investigate and mitigate threats within minutes instead of days is critical. These tools provide solutions to problems before they occur, minimizing negative outcomes from insider threats like data loss, disruption of services, or stolen information.” 

Further, Shoshani recommends: “Protecting data continues to be a priority for businesses, and we must keep our employees in mind when developing these strategies. With the right monitoring of changes in the cloud, we can respond accordingly and prevent insider risks from occurring.” 

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

Digital Journal announced as official media partner for Innovation Week in Calgary.

Business

Pay attention to these issues, because it could be your neck in the noose.

Tech & Science

Hinton, a big name in artificial intelligence, was awarded the 2024 Nobel Prize.

Tech & Science

Foxconn said it is building the world's largest production plant for US hardware leader Nvidia's GB200 "superchips" that power AI servers.