Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Networking

    Learn From Past Incidents

    By
    Fahmida Y. Rashid
    -
    March 5, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Learn From Past Incidents

      1

      Insider attacks are common enough that there will be repeat incidents. Take precautions so that the latest incident can’t be repeated again. IT can write an automated script that can monitor and detect if someone else gets recruited to run the scam again. The company can invest in technology to flag users sending source code through email to an external account or copying data onto a USB drive.

      2Focus on Protecting the Crown Jewels

      2

      Yes, everything is important, but there is one thing that is even more important. That one thing, if stolen and given to a competitor, could be disastrous. Protect that. Examine how people have access to that data and what protections are in place. Organizations need to know what their “Crown Jewels” are and put in controls to block the threat.

      3Use Your Current Technologies Differently

      3

      Organizations have generally deployed technology to keep people outside the network from coming inside. Instead of getting entirely new systems to look at the people on the inside, think of how existing technology can be used differently. Start examining the traffic going out of the network, as well as what is coming in, to see how information is flowing in and out of the company.

      4Mitigate Threats From Trusted Business Partners

      4

      Contractors and third-party service providers are insiders, too. Make sure they can’t take information stored in your systems for one customer and give it another customer. Their access should be limited to a strict need-to-know basis, and there should be regular monitoring to see what information has been accessed.

      5Recognize Concerning Behavior as a Potential Indicator

      5

      Employees who are exceptionally angry or with a history of unresolved issues bear extra watching. Several instances of IT sabotage are actually launched after the employee left the company. If an employee is sending threatening letters to management, consider that a sign. If an employee with a background as a system administrator is working as a night guard, find out why.

      6Educate Employees About Potential Recruitment

      6

      Warn employees that they may be contacted by outside recruiters to run these scams. If employees are aware their managers know this can happen, that can act as a deterrent from joining in the first place. In a credit card environment, it is possible to see if the same employee is approving a high number of users for credit cards that end up defaulting.

      7Pay Close Attention at Resignation and Termination

      7

      Resignation is a very important time period for employees and employers, especially since that is when a bulk of IT property theft occurs. IP theft generally occurs within 30 days of submitting a resignation, so those employees should be carefully monitored. After an employee gives notice, it is also worth checking what happened 30 days prior, as well. Fraud thieves are typically happy and work effectively because they want the scam to continue.

      8Address Employee Privacy Issues With General Counsel

      8

      Auditing employee actions can raise a lot of legal issues. Make sure the company is protected by involving the general counsel and making sure all requirements are met.

      9Work Together Across the Organization

      9

      Detecting, catching and preventing an insider attack is not just the job of the security or the IT team. Everyone should be involved in the process, whether it’s encouraging employees to notify management if they see a colleague sending files to a personal account, or putting together programs to discuss how to handle situations when a criminal recruiter comes knocking on the door.

      10Create an Insider Threat Program Now

      10

      Organizations have to get buy-in from top management and work to build an insider threat team immediately. The problem is too common and too devastating to postpone. Create policies approved by general counsel, develop processes and implement controls. Once it is rolled out, consistently enforce policies.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.