TECHNOLOGY
“ THE NEED TO BACKUP DATA HAS BECOME UBIQUITOUS ”
SURYA VARANASI CTO , STORCENTRIC
“ Many insider threats are not intentional and are caused entirely by accident ,” adds Bob Erdman , Director of Development , Threat Intelligence , Help Systems . “ Users fall victim to malicious phishing or BEC scams and expose their credentials or other damaging information about the organisation . This is subsequently used by threat actors to gather intelligence and potentially cause damage to the user ' s company . This is not only a problem for the employees of the organisation but also can be caused by any third-party partner , contractor or member of the supply chain that can be used as an initial entry point into the final target ' s enterprise .”
Christopher Rogers , Technology Evangelist at Zerto , says “ Employees are arguably an organisation ' s best and first line of defence ” against insider threats . “ To mitigate against the careless employee , businesses should invest in regular training on cyber hygiene and security best practices including how to spot a phishing email and where to report them . A tactic organisations take is to periodically send their employees sample dummy emails as a phishing email ‘ drill ’ as part of this training process .”
Martin Rehak , CEO , Resistant AI , raises awareness on the increase of deepfakes and shallowfakes . “ The difference between deepfakes and shallowfakes is that while deepfakes require AI to create them , shallowfakes can be created using only basic
photo editing software , such as Photoshop ,” Rehak explains . Employees should be on the lookout for fraudulent emails and attempts to garner company secrets .
Hybrid and Remote Working “ The way we work and protect our networks has changed drastically over the last few years ,” said Terry Storrar , Planning Director , Leaseweb . “ Remote working and BYOD have increased the number of attack vectors available to cyber criminals and blurred the lines of the network perimeter . As such , it ’ s no surprise that the 2021 Insider Threat Report by Cybersecurity Insiders found that 53 % of cybersecurity professionals believe detecting insider attacks has become harder since shifting towards the cloud .”
60 November 2022