Cyber Magazine November 2022 | Page 59

“THE REQUIREMENTS FOR PROTECTING DATA CONTINUE TO GET MORE COMPLEX ”
TECHNOLOGY

“THE REQUIREMENTS FOR PROTECTING DATA CONTINUE TO GET MORE COMPLEX ”

ERIC BASSIER SENIOR DIRECTOR PRODUCTS AT QUANTUM
compromised , and negligent ”. Rider explains : “ The ‘ malicious insider ’ is an employee who intentionally steals data , either for personal gain or to negatively impact the organisation involved . A ‘ compromised insider ’, however , generally acts without malice and usually has no idea they ’ ve been compromised . All it takes is clicking on a link in a phishing email or opening an infected file and their credentials can become compromised . Finally , a ‘ careless ’ or ‘ negligent insider ’ is someone who leaves their laptop on the train , walks away from their unlocked workstation , or simply fails to follow cybersecurity best practices . These individuals can be particularly challenging , because their actions are very hard to predict and defend against .”
Raffael Marty , EVP and GM Cybersecurity , ConnectWise , says : " Organisations need to have a comprehensive security programme in place that focuses on both preparedness and visibility . This should cover the playbooks for how to react in case of relevant organisational events and security relevant incidents - from what to do when an employee leaves the organisation , to the specific procedures enacted in the event of an electronic threat such as ransomware or denial of service attack . Visibility means being able to identify and effectively react to potential adverse actions .”
Training Staff Liad Bokovsky , VP Solution Consulting , Axway , says : “ Insider-led threat incidents alone have increased by 44 % this year , most of which were caused by careless employees ( 63 %) not malicious ones .” He advises that companies “ know their vulnerabilities , protect at the pace of attacks , keep their eyes open and put security first ”.
Bokovsky states : “ The ability to detect and respond to security threats as they occur is paramount . Security tactics must evolve as new relationships and workforce needs change – and as the enterprise perimeter shifts . And they have to do it at a speed that matches the fast evolutionary pace of security threats .” cybermagazine . com 59