TAMPA, FL – A 2016 IBM cyber security intelligence report found that 60 percent of all cyber-attacks were related to, or directly the result of, insider activity. Cody Wray, Co-Managing Partner of Tampa FL based Adsero Security, observes that these security breaches often originate from three unique sources within an organization’s known security perimeter.
• Malicious Insider: This individual has motive to harm. He or she could be a disgruntled employee, one facing workplace discipline or financial difficulties, or an individual using work privileges for personal gain.
• Negligent Insider: This employee is bypassing company cyber security protocols to be more productive or save time. He or she is careless in securing data or losing credentials, or is falling prey to phishing attacks that can result in security breaches, theft of sensitive data and the introduction of malware into an organization’s IT systems. These individuals often knowingly exceed the organization’s risk tolerance.
• Third Parties: Subcontractors, vendors, and business partners may all have access to your systems. However, your ability to ensure they adhere to best practices is limited. To maintain your organization’s cyber security standards, all third parties should be treated as a security risk.
“Employees and associates can pose the biggest cyber security threat, whether their actions or intentional or not,” says Wray. “Establishing a culture of security through an employee awareness training program is essential. And, once you have an entity-wide security program in place, an organization must continually evolve with it through ongoing employee training and consistent security program maintenance and updates. Finally, remember that practicing basic cyber hygiene can address or mitigate many security breach attempts.”
Wray says that with diligence, internal threats can be monitored and remediated. Artificial intelligence (AI) and big data analytics support the application of crowdsourced data regarding known external threats to your organization’s internal activities. AI and big data analytics also allow for correlation of multiple internal data points highlighting anomalies that suggest a security risk, Wray advises.
ADSERO OFFERS COMPLIMENTARY SECURITY SCANS
As a service to IT teams at large firms seeking to strengthen their data security protocols in a business environment becoming riskier by the day, Adsero Security announces complimentary external vulnerability scans of internet-facing corporate networks, including up to four external domains or IP addresses.
The offer is in response to proof of increased computer-driven cyber-attacks on U.S. firms identified by Adsero’s intercept tracking technologies at its Tampa headquarters.
For more information, or for a confidential IT security consultation, please call 813-616-5055 or visit email@example.com.