Thursday, October 10, 2024
Michael Stone Online

5 Tips for Stopping Insider Threats

Employers bring on people who have the skills, who have the certifications, who often have longevity in the field, and who they think they can trust. But in an increasingly complex, globalized, ruthless world, the trust portion is becoming harder and harder to find — and when a breach happens, the company has to scramble to reassemble the wreckage.

These internal misuses of trust are commonly referred to as “insider threats.” The term is defined by Carnegie Mellon University’s Software Engineering Institute, a lead researcher on the topic, as an employee, former employee, contractor or business partner who has authorized accesses and “intentionally exceeded or intentionally used that access in a manner that negatively affected the confidentiality, integrity or availability of the organization’s information or information systems.”

Read the full post on the iboss cybersecurity blog.

______________________________________________________________________________________
Keep up with the latest by subscribing to the free newsletter, adding Michael on LinkedIn and following him on Twitter.

Leave A Response