[ad_1]
Insider threats in cybersecurity arise when someone with access chooses to use that access to harm the company or is deceived.
Insider threats in cybersecurity can be employees, contractors, vendors, or visitors, and their intent can be intentional or accidental.
An example of a scenario where this can occur is the healthcare industry. Healthcare providers often need to move patient information between poorly integrated systems. To get the job done, the provider may decide to sidestep the tech her tools and plug in a USB drive to speed up the process. This USB drive can extract sensitive information and give it to others who don’t want it.
Another example of USB risk is when a vendor or service provider needs to perform maintenance on specialized medical equipment. Malware obtained from a previous client is shared because USB is used to transfer important configuration files. Triggers that may warrant additional focus include employment behavior such as resignation, dismissal, job changes, or individuals becoming dissatisfied or dissatisfied with working conditions.
Three resources you can use to learn more about insider threats.
Now that you understand the insider threat, how can you address this ever-present risk?
If you want to reduce the potential for internal threats, you should plan for this risk in advance.
Here are the specific steps:
By considering insider threats and ultimately taking countermeasures, you can gain wisdom as cheaply as possible.
And whether you’re an experienced cyber professional or new to the role of a cyber professional, it’s also true for anyone wondering what’s going on in the mind of a cybersecurity professional.
What are you doing to mitigate insider risk within your company? Share with us in the comments section below.
Thank you for subscribing to my channel to Our mailing list to be notified of what is happening in our community!
Post What are insider threats in cybersecurity? Security Ever After – first appeared in CISO.
*** This is Security Ever After – CISO’s Security Bloggers Network syndicated blog, written by Russell. Read the original post: https://securityeverafter.com/what-are-insider-threats-in-cybersecurity/?utm_source=rss&utm_medium=rss&utm_campaign=what-are-insider-threats-in-cybersecurity
[ad_2]
Source link