Skip to main content

7 Questions for Evaluating your Security Posture against Insider Threats

posted onJuly 5, 2018
by l33tdawg

Insider threats top the list of the most dangerous cyber risks for organizations worldwide. It doesn’t take much effort for insiders to steal your sensitive data, while such activities are hard to discover and impossible to prevent.

Unfortunately, lack of visibility into user behavior is one of the key reasons why companies suffer from data breaches that involve either human negligence or malicious intent.

The latest news from Tesla illustrate how devastating an insider breach can be for the company’s reputation. A couple of days ago, the company reported that its employee used his trusted access to Tesla’s network to change code on internal products and ship highly sensitive data to a third-party. While Tesla still does not know the full extent of the employee’s actions, there is a chance that this incident will become a notable breach of 2018.

Source

Tags

Security

You May Also Like

Recent News

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th