ASSESSMENTS

Mitigating the Insider Cyberthreat: Tools to Defend Against Internal Data Breaches

Feb 21, 2018 | 15:54 GMT

The internet has greatly increased the risk of cyberthreats from within.

(KIRILL KUDRYAVTSEV/AFP/Getty Images)

Analysis Highlights

  • The first steps involve classifying an organization's data and then controlling who can access what based on their need to know.
  • Blocking common channels used to leak data is the next step.
  • The final step involves improving visibility and alerting by setting up in-depth logging of most sensitive classes of data, and alert systems when users try to access that data.

The rise of the internet has greatly increased the risk of cyberthreats from within. Whereas stealing data before might once have involved photocopying reams of pages, a bad inside actor now can make off with vast troves of digital data with just a few clicks. The threat of data exfiltration by malicious insiders keeps many leaders up at night. But there are practical techniques for reducing the risk of insiders exfiltrating data. Four sets of controls are relevant to this task: Classify, Control, Block and Visibility....

Keep Reading

Register to read three free articles

Proceed to sign up

Register Now

Already have an account?

Sign In