Insider threats
Insider threats

THREAT OF THE MONTH: Your employees  

What is it? 

Your employees – whether they are disgruntled or
simply the curious type. They are the doorway for malicious outsiders.  

How does it work? 

Individually they may decide to attempt to access or remove files. They could also have their credentials stolen, allowing hackers to enter in sheep's clothing and operate undetected.    

Should I be worried? 

Absolutely. Detection is key and the goal is to automate. On average it takes more than four months to detect an anomaly, go to the logs to assemble a potential timeline and then decide if its malicious.    

How can I prevent it? 

It is no longer a complex problem that requires human augmentation of data. With technologies like user and entity behavior analytics (UEBA) it can be dealt with using machine augmentation in a fast and errorless manner.